Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-2108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2016-124-01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103" }, { "name": "RHSA-2016:2056", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html" }, { "name": "openSUSE-SU-2016:1238", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" }, { "name": "openSUSE-SU-2016:1242", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" }, { "name": "SUSE-SU-2016:1267", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" }, { "name": "RHSA-2016:2073", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2073.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us" }, { "name": "DSA-3566", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3566" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "openSUSE-SU-2016:1243", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" }, { "name": "GLSA-201612-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-16" }, { "name": "SUSE-SU-2016:1228", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" }, { "name": "1035721", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035721" }, { "tags": [ "x_transferred" ], "url": "http://support.citrix.com/article/CTX212736" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27" }, { "name": "openSUSE-SU-2016:1239", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" }, { "name": "SUSE-SU-2016:1206", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345" }, { "name": "FEDORA-2016-1e39d934ed", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html" }, { "name": "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "name": "SUSE-SU-2016:1231", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "FEDORA-2016-1411324654", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html" }, { "name": "openSUSE-SU-2016:1240", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "openSUSE-SU-2016:1241", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1360", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "SUSE-SU-2016:1233", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" }, { "name": "RHSA-2017:0194", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0194" }, { "tags": [ "x_transferred" ], "url": "http://source.android.com/security/bulletin/2016-07-01.html" }, { "tags": [ "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804" }, { "name": "RHSA-2017:0193", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0193" }, { "name": "openSUSE-SU-2016:1237", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" }, { "tags": [ "x_transferred" ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202" }, { "name": "RHSA-2016:0996", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0996.html" }, { "tags": [ "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20160504-0001/" }, { "name": "91787", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "SUSE-SU-2016:1290", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" }, { "name": "openSUSE-SU-2016:1273", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "USN-2959-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2959-1" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "RHSA-2016:0722", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0722.html" }, { "tags": [ "x_transferred" ], "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/HT206903" }, { "tags": [ "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa123" }, { "name": "89752", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/89752" }, { "name": "FEDORA-2016-05c567df1a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html" }, { "name": "RHSA-2016:1137", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1137" }, { "tags": [ "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SSA:2016-124-01", "tags": [ "vendor-advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103" }, { "name": "RHSA-2016:2056", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html" }, { "name": "openSUSE-SU-2016:1238", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" }, { "name": "openSUSE-SU-2016:1242", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" }, { "name": "SUSE-SU-2016:1267", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" }, { "name": "RHSA-2016:2073", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2073.html" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us" }, { "name": "DSA-3566", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2016/dsa-3566" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us" }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "openSUSE-SU-2016:1243", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" }, { "name": "GLSA-201612-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201612-16" }, { "name": "SUSE-SU-2016:1228", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" }, { "name": "1035721", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1035721" }, { "url": "http://support.citrix.com/article/CTX212736" }, { "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27" }, { "name": "openSUSE-SU-2016:1239", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" }, { "name": "SUSE-SU-2016:1206", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345" }, { "name": "FEDORA-2016-1e39d934ed", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html" }, { "name": "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", "tags": [ "vendor-advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "name": "SUSE-SU-2016:1231", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" }, { "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871" }, { "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us" }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "FEDORA-2016-1411324654", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html" }, { "name": "openSUSE-SU-2016:1240", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "openSUSE-SU-2016:1241", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1360", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" }, { "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "SUSE-SU-2016:1233", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" }, { "name": "RHSA-2017:0194", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:0194" }, { "url": "http://source.android.com/security/bulletin/2016-07-01.html" }, { "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804" }, { "name": "RHSA-2017:0193", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:0193" }, { "name": "openSUSE-SU-2016:1237", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" }, { "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202" }, { "name": "RHSA-2016:0996", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0996.html" }, { "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr" }, { "url": "https://security.netapp.com/advisory/ntap-20160504-0001/" }, { "name": "91787", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "SUSE-SU-2016:1290", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" }, { "name": "openSUSE-SU-2016:1273", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" }, { "name": "RHSA-2016:2957", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "USN-2959-1", "tags": [ "vendor-advisory" ], "url": "http://www.ubuntu.com/usn/USN-2959-1" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "RHSA-2016:0722", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0722.html" }, { "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "url": "https://support.apple.com/HT206903" }, { "url": "https://bto.bluecoat.com/security-advisory/sa123" }, { "name": "89752", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/89752" }, { "name": "FEDORA-2016-05c567df1a", "tags": [ "vendor-advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html" }, { "name": "RHSA-2016:1137", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1137" }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2108", "datePublished": "2016-05-05T00:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-2108\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-05-05T01:59:04.230\",\"lastModified\":\"2024-11-21T02:47:49.563\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \\\"negative zero\\\" issue.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n ASN.1 en OpenSSL en versiones anteriores a 1.0.1o y 1.0.2 en versiones anteriores a 1.0.2c permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (desbordamiento inferior de buffer y corrupci\u00f3n de memoria) a trav\u00e9s de un campo ANY en datos serializados manipulados, tambi\u00e9n conocido como el problema \\\"cero negativo\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.1n\",\"matchCriteriaId\":\"75251AA9-6304-4C01-A334-6F6CD045A497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18797BEE-417D-4959-9AAD-C5A7C051B524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FAA3C31-BD9D-45A9-A502-837FECA6D479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6455A421-9956-4846-AC7C-3431E0D37D23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F946FD-F564-49DA-B043-5943308BA9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C84489B-B08C-4854-8A12-D01B6E45CF79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39A901D6-0874-46A4-92A8-5F72C7A89E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A39C31E3-75C0-4E92-A6B5-7D67B22E3449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB318EA4-2908-4B91-8DBB-20008FDF528A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4E46A9-B652-47CE-92E8-01021E57724B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DD8E3F-6308-4680-B932-4CBD8E58A7FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA9F0F7-D592-481E-884C-B1A94E702825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD857E7-B878-49F9-BDDA-93DDEBB0B42B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A47AB858-36DE-4330-8CAC-1B46C5C8DA80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49413FF7-7910-4F74-B106-C3170612CB2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8882E50-7C49-4A99-91F2-DF979CF8BB2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C32982-095C-4628-9958-118A3D3A9CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4E6353-B77A-464F-B7DE-932704003B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77125688-2CCA-4990-ABB2-551D47CB0CDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A8EC00-266C-409B-AD43-18E8DFCD6FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B846C63A-7261-481E-B4A4-0D8C79E0D8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70C6D8D-C9C3-4D92-8DFC-71F59E068295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691FA41B-C2CE-413F-ABB1-0B22CB322807\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0722.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0996.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2056.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2073.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2957.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://source.android.com/security/bulletin/2016-07-01.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.citrix.com/article/CTX212736\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3566\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/89752\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1035721\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2959-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1137\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0193\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0194\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa123\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201612-16\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20160504-0001/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.openssl.org/news/secadv/20160503.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-18\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0722.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0996.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2957.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://source.android.com/security/bulletin/2016-07-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.citrix.com/article/CTX212736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3566\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/89752\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/91787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1035721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2959-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0194\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201612-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20160504-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openssl.org/news/secadv/20160503.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2016-2108
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-2108", "description": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "id": "GSD-2016-2108", "references": [ "https://www.suse.com/security/cve/CVE-2016-2108.html", "https://www.debian.org/security/2016/dsa-3566", "https://access.redhat.com/errata/RHSA-2017:0194", "https://access.redhat.com/errata/RHSA-2017:0193", "https://access.redhat.com/errata/RHSA-2016:2957", "https://access.redhat.com/errata/RHSA-2016:2073", "https://access.redhat.com/errata/RHSA-2016:2056", "https://access.redhat.com/errata/RHSA-2016:1137", "https://access.redhat.com/errata/RHSA-2016:0996", "https://access.redhat.com/errata/RHSA-2016:0722", "https://ubuntu.com/security/CVE-2016-2108", "https://alas.aws.amazon.com/cve/html/CVE-2016-2108.html", "https://linux.oracle.com/cve/CVE-2016-2108.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-2108" ], "details": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "id": "GSD-2016-2108", "modified": "2023-12-13T01:21:19.806572Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2016-124-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103" }, { "name": "RHSA-2016:2056", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html" }, { "name": "openSUSE-SU-2016:1238", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" }, { "name": "openSUSE-SU-2016:1242", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" }, { "name": "SUSE-SU-2016:1267", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" }, { "name": "RHSA-2016:2073", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2073.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us" }, { "name": "DSA-3566", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3566" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "openSUSE-SU-2016:1243", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" }, { "name": "GLSA-201612-16", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-16" }, { "name": "SUSE-SU-2016:1228", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" }, { "name": "1035721", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035721" }, { "name": "http://support.citrix.com/article/CTX212736", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX212736" }, { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27", "refsource": "CONFIRM", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27" }, { "name": "openSUSE-SU-2016:1239", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" }, { "name": "SUSE-SU-2016:1206", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345" }, { "name": "FEDORA-2016-1e39d934ed", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html" }, { "name": "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "name": "SUSE-SU-2016:1231", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" }, { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871", "refsource": "CONFIRM", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "FEDORA-2016-1411324654", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html" }, { "name": "openSUSE-SU-2016:1240", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "openSUSE-SU-2016:1241", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" }, { "name": "APPLE-SA-2016-07-18-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1360", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" }, { "name": "https://www.tenable.com/security/tns-2016-18", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "SUSE-SU-2016:1233", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" }, { "name": "RHSA-2017:0194", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0194" }, { "name": "http://source.android.com/security/bulletin/2016-07-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-07-01.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804" }, { "name": "RHSA-2017:0193", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0193" }, { "name": "openSUSE-SU-2016:1237", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" }, { "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", "refsource": "CONFIRM", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202" }, { "name": "RHSA-2016:0996", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0996.html" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr" }, { "name": "https://security.netapp.com/advisory/ntap-20160504-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20160504-0001/" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "SUSE-SU-2016:1290", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" }, { "name": "openSUSE-SU-2016:1273", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "USN-2959-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2959-1" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "RHSA-2016:0722", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0722.html" }, { "name": "https://www.openssl.org/news/secadv/20160503.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "name": "https://support.apple.com/HT206903", "refsource": "CONFIRM", "url": "https://support.apple.com/HT206903" }, { "name": "https://bto.bluecoat.com/security-advisory/sa123", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa123" }, { "name": "89752", "refsource": "BID", "url": "http://www.securityfocus.com/bid/89752" }, { "name": "FEDORA-2016-05c567df1a", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html" }, { "name": "RHSA-2016:1137", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1137" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1n", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2108" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27", "refsource": "CONFIRM", "tags": [], "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27" }, { "name": "https://www.openssl.org/news/secadv/20160503.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871", "refsource": "CONFIRM", "tags": [], "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871" }, { "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", "refsource": "CONFIRM", "tags": [], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "name": "http://source.android.com/security/bulletin/2016-07-01.html", "refsource": "CONFIRM", "tags": [], "url": "http://source.android.com/security/bulletin/2016-07-01.html" }, { "name": "RHSA-2016:0722", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0722.html" }, { "name": "RHSA-2016:0996", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0996.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "APPLE-SA-2016-07-18-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "https://support.apple.com/HT206903", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT206903" }, { "name": "91787", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/91787" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "89752", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/89752" }, { "name": "RHSA-2016:1137", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2016:1137" }, { "name": "openSUSE-SU-2016:1240", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" }, { "name": "openSUSE-SU-2016:1238", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" }, { "name": "FEDORA-2016-1e39d934ed", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html" }, { "name": "openSUSE-SU-2016:1242", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" }, { "name": "SUSE-SU-2016:1231", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" }, { "name": "FEDORA-2016-05c567df1a", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html" }, { "name": "USN-2959-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2959-1" }, { "name": "SUSE-SU-2016:1290", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" }, { "name": "openSUSE-SU-2016:1239", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" }, { "name": "openSUSE-SU-2016:1241", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" }, { "name": "SUSE-SU-2016:1206", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" }, { "name": "openSUSE-SU-2016:1237", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" }, { "name": "SSA:2016-124-01", "refsource": "SLACKWARE", "tags": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103" }, { "name": "openSUSE-SU-2016:1243", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" }, { "name": "SUSE-SU-2016:1360", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" }, { "name": "1035721", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035721" }, { "name": "DSA-3566", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2016/dsa-3566" }, { "name": "openSUSE-SU-2016:1273", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" }, { "name": "20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "name": "SUSE-SU-2016:1233", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" }, { "name": "SUSE-SU-2016:1228", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" }, { "name": "FEDORA-2016-1411324654", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html" }, { "name": "SUSE-SU-2016:1267", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa123", "refsource": "CONFIRM", "tags": [], "url": "https://bto.bluecoat.com/security-advisory/sa123" }, { "name": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html" }, { "name": "http://support.citrix.com/article/CTX212736", "refsource": "CONFIRM", "tags": [], "url": "http://support.citrix.com/article/CTX212736" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr", "refsource": "CONFIRM", "tags": [], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr" }, { "name": "GLSA-201612-16", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201612-16" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759", "refsource": "CONFIRM", "tags": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "name": "https://www.tenable.com/security/tns-2016-18", "refsource": "CONFIRM", "tags": [], "url": "https://www.tenable.com/security/tns-2016-18" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://security.netapp.com/advisory/ntap-20160504-0001/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20160504-0001/" }, { "name": "RHSA-2017:0194", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2017:0194" }, { "name": "RHSA-2017:0193", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2017:0193" }, { "name": "RHSA-2016:2957", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "name": "RHSA-2016:2073", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2073.html" }, { "name": "RHSA-2016:2056", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2022-12-13T12:15Z", "publishedDate": "2016-05-05T01:59Z" } } }
rhsa-2016_0996
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)\n\n* Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106)\n\n* It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107)\n\n* Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842)\n\n* A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-0799. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, and CVE-2016-0799; and Juraj Somorovsky as the original reporter of CVE-2016-2107.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0996", "url": "https://access.redhat.com/errata/RHSA-2016:0996" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0996.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T10:03:47+00:00", "generator": { "date": "2024-11-22T10:03:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0996", "initial_release_date": "2016-05-10T04:18:56+00:00", "revision_history": [ { "date": "2016-05-10T04:18:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-10T04:18:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:03:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "product": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "product_id": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "product_id": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.1.i686", "product": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686", "product_id": "openssl-0:1.0.1e-48.el6_8.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.1?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "product_id": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.1.src", "product": { "name": "openssl-0:1.0.1e-48.el6_8.1.src", "product_id": "openssl-0:1.0.1e-48.el6_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.1.s390", "product": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390", "product_id": "openssl-0:1.0.1e-48.el6_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.1?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.1.s390x", "product": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x", "product_id": "openssl-0:1.0.1e-48.el6_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "product_id": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.1?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "product": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "product_id": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.1?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "product_id": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.1.ppc", "product": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc", "product_id": "openssl-0:1.0.1e-48.el6_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.1?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0799", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1312219" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Fix memory issues in BIO_*printf functions", "title": "Vulnerability summary" }, { "category": "other", "text": "The original issue fixed by OpenSSL upstream contains two distinct fixes. The first one is a format string flaw in the internal fmtstr functions, which may result in a OOB read flaw when printing very large string. This issue was assigned CVE-2016-0799\n\nThe second issue relates to the internal doapr_outch function of OpenSSL. It can result in an OOB write, or cause memory leaks. This issue has been assigned CVE-2016-2842 by MITRE as is now tracked as https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2842", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0799" }, { "category": "external", "summary": "RHBZ#1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0799", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" } ], "release_date": "2016-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:18:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0996" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Fix memory issues in BIO_*printf functions" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2105", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331441" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncodeUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "RHBZ#1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:18:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0996" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncodeUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2106", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331536" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncryptUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "RHBZ#1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:18:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0996" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncryptUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Juraj Somorovsky" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2107", "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331426" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Padding oracle in AES-NI CBC MAC check", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "RHBZ#1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:18:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0996" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Padding oracle in AES-NI CBC MAC check" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:18:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0996" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1330101" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ASN.1 BIO handling of large amounts of data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "RHBZ#1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:18:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0996" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: ASN.1 BIO handling of large amounts of data" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2842", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314757" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: doapr_outch function does not verify that certain memory allocation succeeds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2842" }, { "category": "external", "summary": "RHBZ#1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842" } ], "release_date": "2016-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-10T04:18:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0996" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.1.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: doapr_outch function does not verify that certain memory allocation succeeds" } ] }
rhsa-2016_2056
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.\n\nThis release includes bug fixes and enhancements, as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)\n\n* Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183)\n\n* A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195)\n\n* A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic. (CVE-2015-4000)\n\n* An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105)\n\n* An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2106)\n\n* It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP). (CVE-2016-3110)\n\n* A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)\n\n* It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. (CVE-2016-4459)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2105, and CVE-2016-2106 and Michal Karm Babacek for reporting CVE-2016-3110. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; and Guido Vranken as the original reporter of CVE-2016-2105 and CVE-2016-2106.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2056", "url": "https://access.redhat.com/errata/RHSA-2016:2056" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/2688611", "url": "https://access.redhat.com/articles/2688611" }, { "category": "external", "summary": "https://access.redhat.com/solutions/222023", "url": "https://access.redhat.com/solutions/222023" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4" }, { "category": "external", "summary": "1223211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "category": "external", "summary": "1243887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243887" }, { "category": "external", "summary": "1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "1326320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326320" }, { "category": "external", "summary": "1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2056.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.10 update", "tracking": { "current_release_date": "2024-11-22T10:07:14+00:00", "generator": { "date": "2024-11-22T10:07:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2056", "initial_release_date": "2016-10-12T16:57:34+00:00", "revision_history": [ { "date": "2016-10-12T16:57:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-12T16:57:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:07:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product_id": "Red Hat JBoss Enterprise Application Platform 6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3183", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "discovery_date": "2015-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243887" } ], "notes": [ { "category": "description", "text": "Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: HTTP request smuggling attack against chunked request parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3183" }, { "category": "external", "summary": "RHBZ#1243887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3183", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3183" } ], "release_date": "2015-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: HTTP request smuggling attack against chunked request parser" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288322" } ], "notes": [ { "category": "description", "text": "A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X509_ATTRIBUTE memory leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3195" }, { "category": "external", "summary": "RHBZ#1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: X509_ATTRIBUTE memory leak" }, { "cve": "CVE-2015-4000", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1223211" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of openssl and nss libraries as shipped with Red Hat Enterprise Linux 4, 5, 6 and 7. More information about this flaw is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c4 and https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c5.\n\nRed Hat Enterprise Linux 4 is in Extended Life Cycle phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "RHBZ#1223211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4000", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4000" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000" }, { "category": "external", "summary": "https://access.redhat.com/articles/1456263", "url": "https://access.redhat.com/articles/1456263" }, { "category": "external", "summary": "https://weakdh.org/", "url": "https://weakdh.org/" } ], "release_date": "2015-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2105", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331441" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncodeUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "RHBZ#1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncodeUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2106", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331536" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncryptUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "RHBZ#1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncryptUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1330101" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ASN.1 BIO handling of large amounts of data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "RHBZ#1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: ASN.1 BIO handling of large amounts of data" }, { "acknowledgments": [ { "names": [ "Michal Karm Babacek" ] } ], "cve": "CVE-2016-3110", "discovery_date": "2016-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1326320" } ], "notes": [ { "category": "description", "text": "It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP).", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: remotely Segfault Apache http server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3110" }, { "category": "external", "summary": "RHBZ#1326320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3110", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3110" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3110", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3110" } ], "release_date": "2016-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mod_cluster: remotely Segfault Apache http server" }, { "acknowledgments": [ { "names": [ "Robert Bost" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4459", "discovery_date": "2016-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341583" } ], "notes": [ { "category": "description", "text": "It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4459" }, { "category": "external", "summary": "RHBZ#1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4459", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459" } ], "release_date": "2016-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-12T16:57:34+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2056" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 3.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute" } ] }
rhsa-2017_0193
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.23 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.23 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.6, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)\n\n* It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow. (CVE-2016-6808)\n\n* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178)\n\n* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)\n\n* It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. (CVE-2016-4459)\n\n* An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process. (CVE-2016-8612)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-2108. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno Bock, and David Benjamin (Google) as the original reporters of CVE-2016-2108.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0193", "url": "https://access.redhat.com/errata/RHSA-2017:0193" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0193.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 6", "tracking": { "current_release_date": "2024-11-22T10:06:55+00:00", "generator": { "date": "2024-11-22T10:06:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:0193", "initial_release_date": "2017-01-25T20:05:09+00:00", "revision_history": [ { "date": "2017-01-25T20:05:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-01-25T20:05:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:06:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-16.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-debuginfo@2.4.1-16.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-src-zip@2.4.1-16.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-35.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb-debuginfo@5.4-35.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.12.0-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.12.0-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.5-13.Final_redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-src-zip@1.3.5-13.Final_redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.5-13.Final_redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-12.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-12.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-12.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-12.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-12.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-12.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-18.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-src-zip@2.9.1-18.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-18.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-14.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-14.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-src-zip@0.9.6-14.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-zip@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-src-zip@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-102.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-102.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-102.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-src-zip@1.2.41-14.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.41-14.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.41-14.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.41-14.redhat_1.jbcs.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-16.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-debuginfo@2.4.1-16.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-src-zip@2.4.1-16.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb-debuginfo@5.4-35.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-35.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.12.0-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.12.0-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.5-13.Final_redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-src-zip@1.3.5-13.Final_redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.5-13.Final_redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-12.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-12.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-12.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-12.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-12.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-12.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-18.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-src-zip@2.9.1-18.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-18.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-14.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-14.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-src-zip@0.9.6-14.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-zip@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-src-zip@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-102.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-102.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-102.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-src-zip@1.2.41-14.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.41-14.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.41-14.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.41-14.redhat_1.jbcs.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-16.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-35.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "product_id": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.12.0-9.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.5-13.Final_redhat_1.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-12.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-18.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-14.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-102.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.41-14.redhat_1.jbcs.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-102.jbcs.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:05:09+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0193" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341705" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Possible integer overflow vulnerabilities in codebase", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "RHBZ#1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:05:09+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0193" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Possible integer overflow vulnerabilities in codebase" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2016-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343400" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Non-constant time codepath followed for certain operations in DSA implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "RHBZ#1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "http://eprint.iacr.org/2016/594", "url": "http://eprint.iacr.org/2016/594" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:05:09+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0193" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Non-constant time codepath followed for certain operations in DSA implementation" }, { "acknowledgments": [ { "names": [ "Robert Bost" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4459", "discovery_date": "2016-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341583" } ], "notes": [ { "category": "description", "text": "It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4459" }, { "category": "external", "summary": "RHBZ#1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4459", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459" } ], "release_date": "2016-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:05:09+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0193" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 3.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute" }, { "cve": "CVE-2016-6808", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2016-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382352" } ], "notes": [ { "category": "description", "text": "It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_jk: Buffer overflow when concatenating virtual host name and URI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6808" }, { "category": "external", "summary": "RHBZ#1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6808", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808" }, { "category": "external", "summary": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42", "url": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:05:09+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0193" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mod_jk: Buffer overflow when concatenating virtual host name and URI" }, { "cve": "CVE-2016-8612", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1387605" } ], "notes": [ { "category": "description", "text": "An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Protocol parsing logic error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8612" }, { "category": "external", "summary": "RHBZ#1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8612", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612" } ], "release_date": "2016-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:05:09+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0193" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-src-zip-0:1.3.5-13.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-src-zip-0:1.2.41-14.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Protocol parsing logic error" } ] }
rhsa-2016_2957
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services httpd 2.4.23 is now available from the Red Hat Customer Portal for Solaris and Microsoft Windows systems.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6.\n\nSecurity Fix(es):\n\n* This update fixes several flaws in OpenSSL. (CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2177, CVE-2016-2178, CVE-2016-2842)\n\n* This update fixes several flaws in libxml2. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483)\n\n* This update fixes three flaws in curl. (CVE-2016-5419, CVE-2016-5420, CVE-2016-7141)\n\n* This update fixes two flaws in httpd. (CVE-2014-3523, CVE-2015-3185)\n\n* This update fixes two flaws in mod_cluster. (CVE-2016-4459, CVE-2016-8612)\n\n* A buffer overflow flaw when concatenating virtual host names and URIs was fixed in mod_jk. (CVE-2016-6808)\n\n* A memory leak flaw was fixed in expat. (CVE-2012-1148)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2014-8176, CVE-2015-0286, CVE-2016-2108, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Stephen Henson (OpenSSL development team) as the original reporter of CVE-2015-0286; Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2105, CVE-2016-2106, CVE-2016-0797, CVE-2016-0799, and CVE-2016-2842; Juraj Somorovsky as the original reporter of CVE-2016-2107; Yuval Yarom (University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv University), and Nadia Heninger (University of Pennsylvania) as the original reporters of CVE-2016-0702; and Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.\n\nSee the corresponding CVE pages linked to in the References section for more information about each of the flaws listed in this advisory.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2957", "url": "https://access.redhat.com/errata/RHSA-2016:2957" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=distributions\u0026version=2.4.23", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=distributions\u0026version=2.4.23" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services-apache-http-server/version-2.4.23/apache-http-server-2423-release-notes/" }, { "category": "external", "summary": "801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "external", "summary": "1121519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121519" }, { "category": "external", "summary": "1196737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196737" }, { "category": "external", "summary": "1202366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202366" }, { "category": "external", "summary": "1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "external", "summary": "1243888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888" }, { "category": "external", "summary": "1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "external", "summary": "1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "1310599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310599" }, { "category": "external", "summary": "1311880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311880" }, { "category": "external", "summary": "1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "1319829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319829" }, { "category": "external", "summary": "1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "1332443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443" }, { "category": "external", "summary": "1332820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332820" }, { "category": "external", "summary": "1338682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338682" }, { "category": "external", "summary": "1338686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686" }, { "category": "external", "summary": "1338691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338691" }, { "category": "external", "summary": "1338696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338696" }, { "category": "external", "summary": "1338700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700" }, { "category": "external", "summary": "1338701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338701" }, { "category": "external", "summary": "1338702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338702" }, { "category": "external", "summary": "1338703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338703" }, { "category": "external", "summary": "1338705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338705" }, { "category": "external", "summary": "1338706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338706" }, { "category": "external", "summary": "1338708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338708" }, { "category": "external", "summary": "1338711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338711" }, { "category": "external", "summary": "1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "1362183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183" }, { "category": "external", "summary": "1362190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190" }, { "category": "external", "summary": "1373229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "category": "external", "summary": "1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2957.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release", "tracking": { "current_release_date": "2024-11-22T10:35:35+00:00", "generator": { "date": "2024-11-22T10:35:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2957", "initial_release_date": "2016-12-15T22:11:19+00:00", "revision_history": [ { "date": "2016-12-15T22:11:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-12-15T22:11:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:35:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0876", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2012-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "786617" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: hash table collisions CPU usage DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0876" }, { "category": "external", "summary": "RHBZ#786617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: hash table collisions CPU usage DoS" }, { "cve": "CVE-2012-1148", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2012-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "801648" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Expat. If an XML file processed by an application linked against Expat triggered a memory re-allocation failure, Expat failed to free the previously allocated memory. This could cause the application to exit unexpectedly or crash when all available memory is exhausted.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Memory leak in poolGrow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1148" }, { "category": "external", "summary": "RHBZ#801648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1148", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1148" } ], "release_date": "2012-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Memory leak in poolGrow" }, { "cve": "CVE-2014-3523", "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1121519" } ], "notes": [ { "category": "description", "text": "Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: WinNT MPM denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Not affected. This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6 and 7, Red Hat JBoss Web Server 1 and 2, and Red Hat JBoss Enterprise Application Platform 5 and 6. This flaw only affects httpd running on Microsoft Windows. Red Hat JBoss Web Server 1 and 2, and Red Hat JBoss Enterprise Application Platform 5 and 6 can be run on Microsoft Windows. However, these products provide httpd 2.2, which is not affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3523" }, { "category": "external", "summary": "RHBZ#1121519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3523", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3523" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: WinNT MPM denial of service" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] } ], "cve": "CVE-2014-8176", "discovery_date": "2015-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1228611" } ], "notes": [ { "category": "description", "text": "An invalid-free flaw was found in the way OpenSSL handled certain DTLS handshake messages. A malicious DTLS client or server could send a specially crafted message to the peer, which could cause the application to crash or potentially result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Invalid free in DTLS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does NOT affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-8176" }, { "category": "external", "summary": "RHBZ#1228611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" } ], "release_date": "2015-06-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: Invalid free in DTLS" }, { "cve": "CVE-2015-0209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2015-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1196737" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way OpenSSL imported malformed Elliptic Curve private keys. A specially crafted key file could cause an application using OpenSSL to crash when imported.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: use-after-free on invalid EC private key import", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0209" }, { "category": "external", "summary": "RHBZ#1196737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196737" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209" }, { "category": "external", "summary": "https://access.redhat.com/articles/1384453", "url": "https://access.redhat.com/articles/1384453" }, { "category": "external", "summary": "https://openssl.org/news/secadv_20150319.txt", "url": "https://openssl.org/news/secadv_20150319.txt" } ], "release_date": "2015-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: use-after-free on invalid EC private key import" }, { "acknowledgments": [ { "names": [ "OpenSSL project" ] }, { "names": [ "Stephen Henson" ], "organization": "OpenSSL development team", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2015-0286", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1202366" } ], "notes": [ { "category": "description", "text": "An invalid pointer use flaw was found in OpenSSL\u0027s ASN1_TYPE_cmp() function. A remote attacker could crash a TLS/SSL client or server using OpenSSL via a specially crafted X.509 certificate when the attacker-supplied certificate was verified by the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: invalid pointer use in ASN1_TYPE_cmp()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0286" }, { "category": "external", "summary": "RHBZ#1202366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286" }, { "category": "external", "summary": "https://access.redhat.com/articles/1384453", "url": "https://access.redhat.com/articles/1384453" }, { "category": "external", "summary": "https://openssl.org/news/secadv_20150319.txt", "url": "https://openssl.org/news/secadv_20150319.txt" } ], "release_date": "2015-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: invalid pointer use in ASN1_TYPE_cmp()" }, { "cve": "CVE-2015-3185", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2015-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243888" } ], "notes": [ { "category": "description", "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3185" }, { "category": "external", "summary": "RHBZ#1243888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16", "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16" } ], "release_date": "2015-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4" }, { "cve": "CVE-2015-3194", "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288320" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacker could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Certificate verify crash with missing PSS parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "RHBZ#1288320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3194", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2016-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Certificate verify crash with missing PSS parameter" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288322" } ], "notes": [ { "category": "description", "text": "A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: X509_ATTRIBUTE memory leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3195" }, { "category": "external", "summary": "RHBZ#1288322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenSSL: X509_ATTRIBUTE memory leak" }, { "cve": "CVE-2015-3196", "discovery_date": "2015-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1288326" } ], "notes": [ { "category": "description", "text": "A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Race condition handling PSK identify hint", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3196" }, { "category": "external", "summary": "RHBZ#1288326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3196", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20151203.txt", "url": "https://openssl.org/news/secadv/20151203.txt" } ], "release_date": "2015-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Race condition handling PSK identify hint" }, { "cve": "CVE-2015-3216", "discovery_date": "2015-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1227574" } ], "notes": [ { "category": "description", "text": "A regression was found in the ssleay_rand_bytes() function in the versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7. This regression could cause a multi-threaded application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Crash in ssleay_rand_bytes due to locking regression", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of OpenSSL package as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3216" }, { "category": "external", "summary": "RHBZ#1227574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227574" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3216" } ], "release_date": "2015-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Crash in ssleay_rand_bytes due to locking regression" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Daniel Genkin" ], "organization": "Technion and Tel Aviv University", "summary": "Acknowledged by upstream." }, { "names": [ "Nadia Heninger" ], "organization": "University of Pennsylvania", "summary": "Acknowledged by upstream." }, { "names": [ "Yuval Yarom" ], "organization": "University of Adelaide and NICTA", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0702", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310599" } ], "notes": [ { "category": "description", "text": "A side-channel attack was found that makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. An attacker who has the ability to control code in a thread running on the same hyper-threaded core as the victim\u0027s thread that is performing decryption, could use this flaw to recover RSA private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Side channel attack on modular exponentiation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0702" }, { "category": "external", "summary": "RHBZ#1310599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310599" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0702", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702" }, { "category": "external", "summary": "http://cachebleed.info/", "url": "http://cachebleed.info/" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160301.txt", "url": "https://www.openssl.org/news/secadv/20160301.txt" } ], "release_date": "2016-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Side channel attack on modular exponentiation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Adam Langley" ], "organization": "Google/BoringSSL", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0705", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310596" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Double-free in DSA code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0705" }, { "category": "external", "summary": "RHBZ#1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" } ], "release_date": "2016-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Double-free in DSA code" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0797", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311880" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a NULL pointer dereference or a heap-based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0797" }, { "category": "external", "summary": "RHBZ#1311880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0797", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160301.txt", "url": "https://www.openssl.org/news/secadv/20160301.txt" } ], "release_date": "2016-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0799", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1312219" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Fix memory issues in BIO_*printf functions", "title": "Vulnerability summary" }, { "category": "other", "text": "The original issue fixed by OpenSSL upstream contains two distinct fixes. The first one is a format string flaw in the internal fmtstr functions, which may result in a OOB read flaw when printing very large string. This issue was assigned CVE-2016-0799\n\nThe second issue relates to the internal doapr_outch function of OpenSSL. It can result in an OOB write, or cause memory leaks. This issue has been assigned CVE-2016-2842 by MITRE as is now tracked as https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2842", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0799" }, { "category": "external", "summary": "RHBZ#1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0799", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" } ], "release_date": "2016-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Fix memory issues in BIO_*printf functions" }, { "cve": "CVE-2016-1762", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338711" } ], "notes": [ { "category": "description", "text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer-overread in xmlNextChar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1762" }, { "category": "external", "summary": "RHBZ#1338711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1762", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer-overread in xmlNextChar" }, { "cve": "CVE-2016-1833", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338682" } ], "notes": [ { "category": "description", "text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in htmlCurrentChar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1833" }, { "category": "external", "summary": "RHBZ#1338682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1833", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833" } ], "release_date": "2015-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in htmlCurrentChar" }, { "cve": "CVE-2016-1834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338708" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-buffer-overflow in xmlStrncat", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1834" }, { "category": "external", "summary": "RHBZ#1338708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1834", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Heap-buffer-overflow in xmlStrncat" }, { "cve": "CVE-2016-1835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338691" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in xmlSAX2AttributeNs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1835" }, { "category": "external", "summary": "RHBZ#1338691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1835", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in xmlSAX2AttributeNs" }, { "cve": "CVE-2016-1836", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338702" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in xmlDictComputeFastKey", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1836" }, { "category": "external", "summary": "RHBZ#1338702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1836", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in xmlDictComputeFastKey" }, { "cve": "CVE-2016-1837", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338696" } ], "notes": [ { "category": "description", "text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1837" }, { "category": "external", "summary": "RHBZ#1338696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1837", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral" }, { "cve": "CVE-2016-1838", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338705" } ], "notes": [ { "category": "description", "text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1838" }, { "category": "external", "summary": "RHBZ#1338705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1838", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal" }, { "cve": "CVE-2016-1839", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338703" } ], "notes": [ { "category": "description", "text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overread in xmlDictAddString", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1839" }, { "category": "external", "summary": "RHBZ#1338703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338703" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1839", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1839" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overread in xmlDictAddString" }, { "cve": "CVE-2016-1840", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338706" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1840" }, { "category": "external", "summary": "RHBZ#1338706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1840", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2105", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331441" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncodeUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "RHBZ#1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncodeUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2106", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331536" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncryptUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "RHBZ#1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncryptUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Juraj Somorovsky" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2107", "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331426" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Padding oracle in AES-NI CBC MAC check", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "RHBZ#1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Padding oracle in AES-NI CBC MAC check" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1330101" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ASN.1 BIO handling of large amounts of data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "RHBZ#1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: ASN.1 BIO handling of large amounts of data" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341705" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Possible integer overflow vulnerabilities in codebase", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "RHBZ#1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Possible integer overflow vulnerabilities in codebase" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2016-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343400" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Non-constant time codepath followed for certain operations in DSA implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "RHBZ#1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "http://eprint.iacr.org/2016/594", "url": "http://eprint.iacr.org/2016/594" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Non-constant time codepath followed for certain operations in DSA implementation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2842", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314757" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: doapr_outch function does not verify that certain memory allocation succeeds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2842" }, { "category": "external", "summary": "RHBZ#1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842" } ], "release_date": "2016-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: doapr_outch function does not verify that certain memory allocation succeeds" }, { "cve": "CVE-2016-3627", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1319829" } ], "notes": [ { "category": "description", "text": "Missing recursive loop detection checks were found in the xmlParserEntityCheck() and xmlStringGetNodeList() functions of libxml2, causing application using the library to crash by stack exhaustion while building the associated data. An attacker able to send XML data to be parsed in recovery mode could launch a Denial of Service on the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack exhaustion while parsing xml files in recovery mode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3627" }, { "category": "external", "summary": "RHBZ#1319829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3627", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627" } ], "release_date": "2016-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack exhaustion while parsing xml files in recovery mode" }, { "cve": "CVE-2016-3705", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1332443" } ], "notes": [ { "category": "description", "text": "Missing incrementation of recursion depth counter were found in the xmlParserEntityCheck() and xmlParseAttValueComplex() functions used for parsing XML data. An attacker could launch a Denial of Service attack by passing specially crafted XML data to an application, forcing it to crash due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack overflow before detecting invalid XML file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3705" }, { "category": "external", "summary": "RHBZ#1332443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332443" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack overflow before detecting invalid XML file" }, { "cve": "CVE-2016-4447", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338686" } ], "notes": [ { "category": "description", "text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer underreads due to xmlParseName", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4447" }, { "category": "external", "summary": "RHBZ#1338686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4447", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4447" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer underreads due to xmlParseName" }, { "cve": "CVE-2016-4448", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338700" } ], "notes": [ { "category": "description", "text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Format string vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4448" }, { "category": "external", "summary": "RHBZ#1338700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4448", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4448" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Format string vulnerability" }, { "cve": "CVE-2016-4449", "discovery_date": "2016-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1338701" } ], "notes": [ { "category": "description", "text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Inappropriate fetch of entities content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4449" }, { "category": "external", "summary": "RHBZ#1338701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338701" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4449", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Inappropriate fetch of entities content" }, { "acknowledgments": [ { "names": [ "Robert Bost" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4459", "discovery_date": "2016-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341583" } ], "notes": [ { "category": "description", "text": "It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4459" }, { "category": "external", "summary": "RHBZ#1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4459", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459" } ], "release_date": "2016-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 3.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute" }, { "cve": "CVE-2016-4483", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1332820" } ], "notes": [ { "category": "description", "text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: out-of-bounds read", "title": "Vulnerability summary" }, { "category": "other", "text": "When a specially-crafted XML file is parsed via an application compiled against libxml2, this can cause the application to crash. (No code execution)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4483" }, { "category": "external", "summary": "RHBZ#1332820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332820" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4483", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: out-of-bounds read" }, { "cve": "CVE-2016-5419", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1362183" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library did not prevent TLS session resumption when the client certificate had changed. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: TLS session resumption client cert bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5419" }, { "category": "external", "summary": "RHBZ#1362183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5419", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5419" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160803A.html", "url": "https://curl.haxx.se/docs/adv_20160803A.html" } ], "release_date": "2016-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: TLS session resumption client cert bypass" }, { "cve": "CVE-2016-5420", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1362190" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library did not check the client certificate when choosing the TLS connection to reuse. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Re-using connection with wrong client cert", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5420" }, { "category": "external", "summary": "RHBZ#1362190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5420", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5420" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160803B.html", "url": "https://curl.haxx.se/docs/adv_20160803B.html" } ], "release_date": "2016-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Re-using connection with wrong client cert" }, { "cve": "CVE-2016-6808", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2016-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382352" } ], "notes": [ { "category": "description", "text": "It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_jk: Buffer overflow when concatenating virtual host name and URI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6808" }, { "category": "external", "summary": "RHBZ#1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6808", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808" }, { "category": "external", "summary": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42", "url": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mod_jk: Buffer overflow when concatenating virtual host name and URI" }, { "cve": "CVE-2016-7141", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2016-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1373229" } ], "notes": [ { "category": "description", "text": "It was found that the libcurl library using the NSS (Network Security Services) library as TLS/SSL backend incorrectly re-used client certificates for subsequent TLS connections in certain cases. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Incorrect reuse of client certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7141" }, { "category": "external", "summary": "RHBZ#1373229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7141", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7141" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160907.html", "url": "https://curl.haxx.se/docs/adv_20160907.html" } ], "release_date": "2016-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Incorrect reuse of client certificates" }, { "cve": "CVE-2016-8612", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1387605" } ], "notes": [ { "category": "description", "text": "An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Protocol parsing logic error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8612" }, { "category": "external", "summary": "RHBZ#1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8612", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612" } ], "release_date": "2016-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-12-15T22:11:19+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2957" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Protocol parsing logic error" } ] }
rhsa-2016_2073
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)\n\n* Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106)\n\n* It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107)\n\n* Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842)\n\n* A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-0799. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, and CVE-2016-0799; and Juraj Somorovsky as the original reporter of CVE-2016-2107.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2073", "url": "https://access.redhat.com/errata/RHSA-2016:2073" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2073.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T10:04:25+00:00", "generator": { "date": "2024-11-22T10:04:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2073", "initial_release_date": "2016-10-18T07:08:06+00:00", "revision_history": [ { "date": "2016-10-18T07:08:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-18T07:08:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:04:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.5.x86_64", "product": { "name": "openssl-0:1.0.1e-42.el6_7.5.x86_64", "product_id": "openssl-0:1.0.1e-42.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "product_id": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.5.i686", "product": { "name": "openssl-0:1.0.1e-42.el6_7.5.i686", "product_id": "openssl-0:1.0.1e-42.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.5.i686", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.i686", "product_id": "openssl-static-0:1.0.1e-42.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.5.i686", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.i686", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.5.i686", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.i686", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.5.src", "product": { "name": "openssl-0:1.0.1e-42.el6_7.5.src", "product_id": "openssl-0:1.0.1e-42.el6_7.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "product_id": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.5.ppc64", "product": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc64", "product_id": "openssl-0:1.0.1e-42.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "product": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "product_id": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-42.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-42.el6_7.5.s390x", "product": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.s390x", "product_id": "openssl-static-0:1.0.1e-42.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-42.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.5.s390x", "product": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390x", "product_id": "openssl-0:1.0.1e-42.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.5?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.5.s390", "product": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390", "product_id": "openssl-0:1.0.1e-42.el6_7.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.5?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.5?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-42.el6_7.5?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "product": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "product_id": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-42.el6_7.5?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-42.el6_7.5.ppc", "product": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc", "product_id": "openssl-0:1.0.1e-42.el6_7.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-42.el6_7.5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0799", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1312219" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Fix memory issues in BIO_*printf functions", "title": "Vulnerability summary" }, { "category": "other", "text": "The original issue fixed by OpenSSL upstream contains two distinct fixes. The first one is a format string flaw in the internal fmtstr functions, which may result in a OOB read flaw when printing very large string. This issue was assigned CVE-2016-0799\n\nThe second issue relates to the internal doapr_outch function of OpenSSL. It can result in an OOB write, or cause memory leaks. This issue has been assigned CVE-2016-2842 by MITRE as is now tracked as https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2842", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0799" }, { "category": "external", "summary": "RHBZ#1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0799", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" } ], "release_date": "2016-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-18T07:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2073" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Fix memory issues in BIO_*printf functions" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2105", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331441" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncodeUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "RHBZ#1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-18T07:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2073" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncodeUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2106", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331536" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncryptUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "RHBZ#1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-18T07:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2073" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncryptUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Juraj Somorovsky" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2107", "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331426" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Padding oracle in AES-NI CBC MAC check", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "RHBZ#1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-18T07:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2073" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Padding oracle in AES-NI CBC MAC check" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-18T07:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2073" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1330101" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ASN.1 BIO handling of large amounts of data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "RHBZ#1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-18T07:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2073" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: ASN.1 BIO handling of large amounts of data" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2842", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314757" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: doapr_outch function does not verify that certain memory allocation succeeds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2842" }, { "category": "external", "summary": "RHBZ#1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842" } ], "release_date": "2016-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-18T07:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2073" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.src", "6Server-optional-6.7.EUS:openssl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-debuginfo-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-devel-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-perl-0:1.0.1e-42.el6_7.5.x86_64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.i686", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.ppc64", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.s390x", "6Server-optional-6.7.EUS:openssl-static-0:1.0.1e-42.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: doapr_outch function does not verify that certain memory allocation succeeds" } ] }
rhsa-2016_1137
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)\n\nRed Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1137", "url": "https://access.redhat.com/errata/RHSA-2016:1137" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1137.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T10:03:53+00:00", "generator": { "date": "2024-11-22T10:03:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:1137", "initial_release_date": "2016-05-31T05:56:24+00:00", "revision_history": [ { "date": "2016-05-31T05:56:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-31T05:56:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:03:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.ppc64", "product": { "name": "openssl-0:0.9.8e-40.el5_11.ppc64", "product_id": "openssl-0:0.9.8e-40.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc64", "product": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc64", "product_id": "openssl-devel-0:0.9.8e-40.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-40.el5_11?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:0.9.8e-40.el5_11.ppc", "product": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ppc", "product_id": "openssl-perl-0:0.9.8e-40.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-40.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc", "product": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc", "product_id": "openssl-devel-0:0.9.8e-40.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-40.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.ppc", "product": { "name": "openssl-0:0.9.8e-40.el5_11.ppc", "product_id": "openssl-0:0.9.8e-40.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-40.el5_11.s390x", "product": { "name": "openssl-perl-0:0.9.8e-40.el5_11.s390x", "product_id": "openssl-perl-0:0.9.8e-40.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-40.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.s390x", "product": { "name": "openssl-0:0.9.8e-40.el5_11.s390x", "product_id": "openssl-0:0.9.8e-40.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-40.el5_11.s390x", "product": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390x", "product_id": "openssl-devel-0:0.9.8e-40.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-40.el5_11?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.s390", "product": { "name": "openssl-0:0.9.8e-40.el5_11.s390", "product_id": "openssl-0:0.9.8e-40.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-40.el5_11.s390", "product": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390", "product_id": "openssl-devel-0:0.9.8e-40.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-40.el5_11?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.8e-40.el5_11.x86_64", "product": { "name": "openssl-devel-0:0.9.8e-40.el5_11.x86_64", "product_id": "openssl-devel-0:0.9.8e-40.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-40.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.x86_64", "product": { "name": "openssl-0:0.9.8e-40.el5_11.x86_64", "product_id": "openssl-0:0.9.8e-40.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-40.el5_11.x86_64", "product": { "name": "openssl-perl-0:0.9.8e-40.el5_11.x86_64", "product_id": "openssl-perl-0:0.9.8e-40.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-40.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-40.el5_11.i386", "product": { "name": "openssl-devel-0:0.9.8e-40.el5_11.i386", "product_id": "openssl-devel-0:0.9.8e-40.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-40.el5_11?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.i386", "product": { "name": "openssl-0:0.9.8e-40.el5_11.i386", "product_id": "openssl-0:0.9.8e-40.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-40.el5_11.i386", "product": { "name": "openssl-perl-0:0.9.8e-40.el5_11.i386", "product_id": "openssl-perl-0:0.9.8e-40.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-40.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.i686", "product": { "name": "openssl-0:0.9.8e-40.el5_11.i686", "product_id": "openssl-0:0.9.8e-40.el5_11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-0:0.9.8e-40.el5_11.ia64", "product": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ia64", "product_id": "openssl-devel-0:0.9.8e-40.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-40.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.ia64", "product": { "name": "openssl-0:0.9.8e-40.el5_11.ia64", "product_id": "openssl-0:0.9.8e-40.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.8e-40.el5_11.ia64", "product": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ia64", "product_id": "openssl-perl-0:0.9.8e-40.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-40.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "product": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "product_id": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-40.el5_11?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.8e-40.el5_11.src", "product": { "name": "openssl-0:0.9.8e-40.el5_11.src", "product_id": "openssl-0:0.9.8e-40.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.8e-40.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.src" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.i686", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.src" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.src", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.src" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-devel-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.8e-40.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64" }, "product_reference": "openssl-perl-0:0.9.8e-40.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T05:56:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1137" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Client-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Client-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Client-Workstation-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Client-Workstation-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.i686", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.src", "5Server-5.11.Z:openssl-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.i686", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-debuginfo-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.ppc64", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-devel-0:0.9.8e-40.el5_11.x86_64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.i386", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ia64", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.ppc", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.s390x", "5Server-5.11.Z:openssl-perl-0:0.9.8e-40.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" } ] }
rhsa-2017_0194
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for JBoss Core Services on RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.23 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.6 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)\n\n* It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow. (CVE-2016-6808)\n\n* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178)\n\n* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)\n\n* It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. (CVE-2016-4459)\n\n* An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process. (CVE-2016-8612)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-2108. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno Bock, and David Benjamin (Google) as the original reporters of CVE-2016-2108.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0194", "url": "https://access.redhat.com/errata/RHSA-2017:0194" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0194.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 7", "tracking": { "current_release_date": "2024-11-22T10:07:00+00:00", "generator": { "date": "2024-11-22T10:07:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:0194", "initial_release_date": "2017-01-25T20:04:50+00:00", "revision_history": [ { "date": "2017-01-25T20:04:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-01-25T20:04:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:07:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-debuginfo@2.4.1-16.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-src-zip@2.4.1-16.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-16.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.12.0-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.12.0-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-35.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb-debuginfo@5.4-35.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.5-13.Final_redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.5-13.Final_redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-12.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-12.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-12.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-12.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-12.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-12.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-18.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-18.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-src-zip@2.9.1-18.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-14.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-src-zip@0.9.6-14.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-14.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-zip@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-src-zip@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-102.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-102.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-102.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.41-14.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.41-14.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.41-14.redhat_1.jbcs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-16.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.12.0-9.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-35.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.5-13.Final_redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-12.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-18.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-14.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-102.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.41-14.redhat_1.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-102.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:04:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0194" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341705" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Possible integer overflow vulnerabilities in codebase", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "RHBZ#1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:04:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0194" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Possible integer overflow vulnerabilities in codebase" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2016-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343400" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Non-constant time codepath followed for certain operations in DSA implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "RHBZ#1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "http://eprint.iacr.org/2016/594", "url": "http://eprint.iacr.org/2016/594" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:04:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0194" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Non-constant time codepath followed for certain operations in DSA implementation" }, { "acknowledgments": [ { "names": [ "Robert Bost" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4459", "discovery_date": "2016-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341583" } ], "notes": [ { "category": "description", "text": "It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4459" }, { "category": "external", "summary": "RHBZ#1341583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4459", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4459" } ], "release_date": "2016-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:04:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0194" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 3.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute" }, { "cve": "CVE-2016-6808", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2016-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1382352" } ], "notes": [ { "category": "description", "text": "It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_jk: Buffer overflow when concatenating virtual host name and URI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6808" }, { "category": "external", "summary": "RHBZ#1382352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382352" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6808", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6808" }, { "category": "external", "summary": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42", "url": "https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.42" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:04:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0194" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mod_jk: Buffer overflow when concatenating virtual host name and URI" }, { "cve": "CVE-2016-8612", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1387605" } ], "notes": [ { "category": "description", "text": "An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_cluster: Protocol parsing logic error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8612" }, { "category": "external", "summary": "RHBZ#1387605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8612", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8612" } ], "release_date": "2016-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-01-25T20:04:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0194" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-102.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-src-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-zip-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-35.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-src-zip-0:0.9.6-14.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.5-13.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.41-14.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.41-14.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-src-zip-0:2.4.1-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-src-zip-0:2.9.1-18.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-102.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.12.0-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-12.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-12.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_cluster: Protocol parsing logic error" } ] }
rhsa-2016_0722
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)\n\n* Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106)\n\n* It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107)\n\n* Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842)\n\n* A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-0799. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno B\u00f6ck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, and CVE-2016-0799; and Juraj Somorovsky as the original reporter of CVE-2016-2107.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0722", "url": "https://access.redhat.com/errata/RHSA-2016:0722" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0722.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T10:03:41+00:00", "generator": { "date": "2024-11-22T10:03:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0722", "initial_release_date": "2016-05-09T09:28:24+00:00", "revision_history": [ { "date": "2016-05-09T09:28:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-09T09:28:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:03:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "product_id": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.5?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "product": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "product_id": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "product_id": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.5.src", "product": { "name": "openssl-1:1.0.1e-51.el7_2.5.src", "product_id": "openssl-1:1.0.1e-51.el7_2.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "product_id": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "product": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "product_id": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.5?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "product_id": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.5?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "product_id": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "product": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "product_id": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "product": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "product_id": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-51.el7_2.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "product_id": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-51.el7_2.5.s390x", "product": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x", "product_id": "openssl-1:1.0.1e-51.el7_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-51.el7_2.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "product": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "product_id": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-51.el7_2.5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "product": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "product_id": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-51.el7_2.5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "product": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "product_id": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-51.el7_2.5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "product": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "product_id": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-51.el7_2.5?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.i686", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0799", "discovery_date": "2016-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1312219" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Fix memory issues in BIO_*printf functions", "title": "Vulnerability summary" }, { "category": "other", "text": "The original issue fixed by OpenSSL upstream contains two distinct fixes. The first one is a format string flaw in the internal fmtstr functions, which may result in a OOB read flaw when printing very large string. This issue was assigned CVE-2016-0799\n\nThe second issue relates to the internal doapr_outch function of OpenSSL. It can result in an OOB write, or cause memory leaks. This issue has been assigned CVE-2016-2842 by MITRE as is now tracked as https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2842", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0799" }, { "category": "external", "summary": "RHBZ#1312219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0799", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" } ], "release_date": "2016-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T09:28:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0722" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Fix memory issues in BIO_*printf functions" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2105", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331441" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncodeUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "RHBZ#1331441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T09:28:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0722" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncodeUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2106", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331536" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: EVP_EncryptUpdate overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "RHBZ#1331536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T09:28:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0722" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: EVP_EncryptUpdate overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Juraj Somorovsky" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2107", "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331426" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Padding oracle in AES-NI CBC MAC check", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "RHBZ#1331426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T09:28:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0722" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Padding oracle in AES-NI CBC MAC check" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "David Benjamin" ], "organization": "Google", "summary": "Acknowledged by upstream." }, { "names": [ "Hanno B\u00f6ck" ], "summary": "Acknowledged by upstream." }, { "names": [ "Huzaifa Sidhpurwala" ], "organization": "Red Hat", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2108", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331402" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Memory corruption in the ASN.1 encoder", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "RHBZ#1331402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T09:28:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0722" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Memory corruption in the ASN.1 encoder" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1330101" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ASN.1 BIO handling of large amounts of data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "RHBZ#1330101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "https://openssl.org/news/secadv/20160503.txt", "url": "https://openssl.org/news/secadv/20160503.txt" } ], "release_date": "2016-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T09:28:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0722" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: ASN.1 BIO handling of large amounts of data" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Guido Vranken" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-2842", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314757" } ], "notes": [ { "category": "description", "text": "Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: doapr_outch function does not verify that certain memory allocation succeeds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2842" }, { "category": "external", "summary": "RHBZ#1314757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2842", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2842" } ], "release_date": "2016-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-09T09:28:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0722" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Client-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Client-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7ComputeNode-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7ComputeNode-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Server-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Server-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.src", "7Workstation-optional-7.2.Z:openssl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-debuginfo-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-devel-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-libs-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-perl-1:1.0.1e-51.el7_2.5.x86_64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.i686", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.ppc64le", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.s390x", "7Workstation-optional-7.2.Z:openssl-static-1:1.0.1e-51.el7_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: doapr_outch function does not verify that certain memory allocation succeeds" } ] }
var-201605-0078
Vulnerability from variot
The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue. OpenSSL is prone to remote memory-corruption vulnerability. Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the application using the vulnerable library. Failed exploit attempts will result in denial-of-service conditions. Following product versions are affected: OpenSSL versions 1.0.2 prior to 1.0.2c OpenSSL versions 1.0.1 prior to 1.0.1o. 5 client) - i386, x86_64
Gentoo Linux Security Advisory GLSA 201612-16
https://security.gentoo.org/
Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: December 07, 2016 Bugs: #581234, #585142, #585276, #591454, #592068, #592074, #592082, #594500, #595186 ID: 201612-16
Synopsis
Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/openssl < 1.0.2j >= 1.0.2j
Description
Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers and the International Association for Cryptologic Research's (IACR) paper, "Make Sure DSA Signing Exponentiations Really are Constant-Time" for further details.
Impact
Remote attackers could cause a Denial of Service condition or have other unspecified impacts.
Workaround
There is no known workaround at this time.
Resolution
All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2j"
References
[ 1 ] CVE-2016-2105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105 [ 2 ] CVE-2016-2106 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106 [ 3 ] CVE-2016-2107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107 [ 4 ] CVE-2016-2108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108 [ 5 ] CVE-2016-2109 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109 [ 6 ] CVE-2016-2176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176 [ 7 ] CVE-2016-2177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177 [ 8 ] CVE-2016-2178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178 [ 9 ] CVE-2016-2180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180 [ 10 ] CVE-2016-2183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183 [ 11 ] CVE-2016-6304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304 [ 12 ] CVE-2016-6305 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305 [ 13 ] CVE-2016-6306 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306 [ 14 ] CVE-2016-7052 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052 [ 15 ] Make Sure DSA Signing Exponentiations Really are Constant-Time http://eprint.iacr.org/2016/594.pdf
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201612-16
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: openssl security update Advisory ID: RHSA-2016:0722-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0722.html Issue date: 2016-05-09 CVE Names: CVE-2016-0799 CVE-2016-2105 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 CVE-2016-2842 =====================================================================
- Summary:
An update for openssl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
-
A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108)
-
Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. (CVE-2016-2105, CVE-2016-2106)
-
It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107)
-
Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842)
-
A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-0799. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno Böck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, and CVE-2016-0799; and Juraj Somorovsky as the original reporter of CVE-2016-2107.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.
- Bugs fixed (https://bugzilla.redhat.com/):
1312219 - CVE-2016-0799 OpenSSL: Fix memory issues in BIO_*printf functions 1314757 - CVE-2016-2842 openssl: doapr_outch function does not verify that certain memory allocation succeeds 1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data 1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder 1331426 - CVE-2016-2107 openssl: Padding oracle in AES-NI CBC MAC check 1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow 1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: openssl-1.0.1e-51.el7_2.5.src.rpm
x86_64: openssl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.5.i686.rpm openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.5.i686.rpm openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-static-1.0.1e-51.el7_2.5.i686.rpm openssl-static-1.0.1e-51.el7_2.5.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: openssl-1.0.1e-51.el7_2.5.src.rpm
x86_64: openssl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.5.i686.rpm openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.5.i686.rpm openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-static-1.0.1e-51.el7_2.5.i686.rpm openssl-static-1.0.1e-51.el7_2.5.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: openssl-1.0.1e-51.el7_2.5.src.rpm
ppc64: openssl-1.0.1e-51.el7_2.5.ppc64.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.ppc64.rpm openssl-devel-1.0.1e-51.el7_2.5.ppc.rpm openssl-devel-1.0.1e-51.el7_2.5.ppc64.rpm openssl-libs-1.0.1e-51.el7_2.5.ppc.rpm openssl-libs-1.0.1e-51.el7_2.5.ppc64.rpm
ppc64le: openssl-1.0.1e-51.el7_2.5.ppc64le.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.ppc64le.rpm openssl-devel-1.0.1e-51.el7_2.5.ppc64le.rpm openssl-libs-1.0.1e-51.el7_2.5.ppc64le.rpm
s390x: openssl-1.0.1e-51.el7_2.5.s390x.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.s390x.rpm openssl-devel-1.0.1e-51.el7_2.5.s390.rpm openssl-devel-1.0.1e-51.el7_2.5.s390x.rpm openssl-libs-1.0.1e-51.el7_2.5.s390.rpm openssl-libs-1.0.1e-51.el7_2.5.s390x.rpm
x86_64: openssl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.5.i686.rpm openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.5.i686.rpm openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: openssl-debuginfo-1.0.1e-51.el7_2.5.ppc.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.ppc64.rpm openssl-perl-1.0.1e-51.el7_2.5.ppc64.rpm openssl-static-1.0.1e-51.el7_2.5.ppc.rpm openssl-static-1.0.1e-51.el7_2.5.ppc64.rpm
ppc64le: openssl-debuginfo-1.0.1e-51.el7_2.5.ppc64le.rpm openssl-perl-1.0.1e-51.el7_2.5.ppc64le.rpm openssl-static-1.0.1e-51.el7_2.5.ppc64le.rpm
s390x: openssl-debuginfo-1.0.1e-51.el7_2.5.s390.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.s390x.rpm openssl-perl-1.0.1e-51.el7_2.5.s390x.rpm openssl-static-1.0.1e-51.el7_2.5.s390.rpm openssl-static-1.0.1e-51.el7_2.5.s390x.rpm
x86_64: openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-static-1.0.1e-51.el7_2.5.i686.rpm openssl-static-1.0.1e-51.el7_2.5.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: openssl-1.0.1e-51.el7_2.5.src.rpm
x86_64: openssl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-devel-1.0.1e-51.el7_2.5.i686.rpm openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm openssl-libs-1.0.1e-51.el7_2.5.i686.rpm openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm openssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm openssl-static-1.0.1e-51.el7_2.5.i686.rpm openssl-static-1.0.1e-51.el7_2.5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-0799 https://access.redhat.com/security/cve/CVE-2016-2105 https://access.redhat.com/security/cve/CVE-2016-2106 https://access.redhat.com/security/cve/CVE-2016-2107 https://access.redhat.com/security/cve/CVE-2016-2108 https://access.redhat.com/security/cve/CVE-2016-2109 https://access.redhat.com/security/cve/CVE-2016-2842 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFXMFlTXlSAg2UNWIIRAhYAAJ0T9Ib2vXUa5te34i6fphHrbe0HlwCfePy5 WjaK8x9OaI0FgbWyfxvwq6o= =jHjh -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. This could lead to a heap corruption. This could lead to a heap corruption.
CVE-2016-2107
Juraj Somorovsky discovered a padding oracle in the AES CBC cipher
implementation based on the AES-NI instruction set. This could allow
an attacker to decrypt TLS traffic encrypted with one of the cipher
suites based on AES CBC.
CVE-2016-2108
David Benjamin from Google discovered that two separate bugs in the
ASN.1 encoder, related to handling of negative zero integer values
and large universal tags, could lead to an out-of-bounds write.
CVE-2016-2109
Brian Carpenter discovered that when ASN.1 data is read from a BIO
using functions such as d2i_CMS_bio(), a short invalid encoding can
casuse allocation of large amounts of memory potentially consuming
excessive resources or exhausting memory.
CVE-2016-2176
Guido Vranken discovered that ASN.1 Strings that are over 1024 bytes
can cause an overread in applications using the X509_NAME_oneline()
function on EBCDIC systems. This could result in arbitrary stack data
being returned in the buffer.
Additional information about these issues can be found in the OpenSSL security advisory at https://www.openssl.org/news/secadv/20160503.txt
For the stable distribution (jessie), these problems have been fixed in version 1.0.1k-3+deb8u5.
For the unstable distribution (sid), these problems have been fixed in version 1.0.2h-1.
We recommend that you upgrade your openssl packages. Description:
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.
This release includes bug fixes and enhancements, as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. The JBoss server process must be restarted for the update to take effect. (CVE-2016-2108)
-
Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3195)
-
A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic. (CVE-2016-2106)
-
It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP). (CVE-2016-2109)
-
It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. Description:
This release adds the new Apache HTTP Server 2.4.23 packages that are part of the JBoss Core Services offering. (CVE-2016-2108)
-
It was found that the length checks prior to writing to the target buffer for creating a virtual host mapping rule did not take account of the length of the virtual host name, creating the potential for a buffer overflow. (CVE-2016-6808)
-
It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. (CVE-2016-4459)
-
An error was found in protocol parsing logic of mod_cluster load balancer Apache HTTP Server modules. An attacker could use this flaw to cause a Segmentation Fault in the serving httpd process. After installing the updated packages, the httpd daemon will be restarted automatically. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03765en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03765en_us Version: 1
HPESBHF03765 rev.1 - HPE ConvergedSystem 700 Solution with Comware v7 Switches using OpenSSL, Remote Denial of Service (DoS) and Disclosure of Sensitive Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2017-07-20 Last Updated: 2017-07-20
Potential Security Impact: Remote: Denial of Service (DoS), Disclosure of Sensitive Information
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities in OpenSSL have been addressed in HPE Network Products including Comware v7 that is applicable for ConvergedSystem 700 solutions. The vulnerabilities could be remotely exploited resulting in Denial of Service (DoS) or disclosure of sensitive information.
- HP ConvergedSystem 700 for Virtualization 1.0
- HP ConvergedSystem 700 for Virtualization 1.1 1.1
- HP ConvergedSystem 700 Virtualization 2.0 Foundation Kit 2.0
- HP ConvergedSystem 700 Virtualization 2.0 VMware Kit 2.0
- HP ConvergedSystem 700x 1.0
- HP ConvergedSystem 700x for Microsoft Solution Kit 1.0
- HP ConvergedSystem 700x v1.1 Microsoft Kit 1.1
- HP ConvergedSystem 700x v1.1 VMware Kit 1.1
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2016-2105
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2106
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2016-2107
3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVE-2016-2108
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-2109
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVE-2016-2176
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE recommends upgrading your network switches to Comware v7 Version R2422P02 which is part of the HPE ConvergedSystem 700 Solution as listed below:
- CS700/CS700x 1.0 and 1.1 solution:
-
HPN 5900 Switch (JG510A/JH038A) (JC772A/JG554A) (JG296A)
-
CS700 2.0 solution:
-
HPE FlexFabric 5930 Switch 4slot (JH179A/JH188A) 2slot+2QSFP+ (JH178A/JH187A)
-
HPE has provided the following Customer Notice that includes links to documentation to assist you in maintaining your HPE ConvergedSystem 700 solution:
+ http://h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-a00006123en_ s
Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates.
HISTORY Version:1 (rev.1) - 21 July 2017 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004
OS X El Capitan v10.11.6 and Security Update 2016-004 is now available and addresses the following:
apache_mod_php
Available for:
OS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later
Impact: A remote attacker may be able to execute arbitrary code
Description: Multiple issues existed in PHP versions prior to
5.5.36. These were addressed by updating PHP to version 5.5.36.
CVE-2016-4650
Audio Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4647 : Juwei Lin (@fuzzerDOTcn) of Trend Micro
Audio Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to determine kernel memory layout Description: An out-of-bounds read was addressed through improved input validation. CVE-2016-4648 : Juwei Lin(@fuzzerDOTcn) of Trend Micro
Audio Available for: OS X El Capitan v10.11 and later Impact: Parsing a maliciously crafted audio file may lead to the disclosure of user information Description: An out-of-bounds read was addressed through improved bounds checking. CVE-2016-4646 : Steven Seeley of Source Incite working with Trend Micro's Zero Day Initiative
Audio Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to cause a system denial of service Description: A null pointer dereference was addressed through improved input validation. CVE-2016-4649 : Juwei Lin(@fuzzerDOTcn) of Trend Micro
bsdiff Available for: OS X El Capitan v10.11 and later Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: An integer overflow existed in bspatch. This issue was addressed through improved bounds checking. CVE-2014-9862 : an anonymous researcher
CFNetwork Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to view sensitive user information Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed through improved restrictions. CVE-2016-4645 : Abhinav Bansal of Zscaler Inc.
CoreGraphics Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4637 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports)
CoreGraphics Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to elevate privileges Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2016-4652 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
FaceTime Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminated Description: User interface inconsistencies existed in the handling of relayed calls. These issues were addressed through improved FaceTime display logic. CVE-2016-4635 : Martin Vigo
Graphics Drivers Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4634 : Stefan Esser of SektionEins
ImageIO Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to cause a denial of service Description: A memory consumption issue was addressed through improved memory handling. CVE-2016-4632 : Evgeny Sidorov of Yandex
ImageIO Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4631 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports)
ImageIO Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4629 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports) CVE-2016-4630 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports)
Intel Graphics Driver Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4633 : an anonymous researcher
IOHIDFamily Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved input validation. CVE-2016-4626 : Stefan Esser of SektionEins
IOSurface Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A use-after-free was addressed through improved memory management. CVE-2016-4625 : Ian Beer of Google Project Zero
Kernel Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-1863 : Ian Beer of Google Project Zero CVE-2016-1864 : Ju Zhu of Trend Micro CVE-2016-4582 : Shrek_wzw and Proteas of Qihoo 360 Nirvan Team
Kernel Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to cause a system denial of service Description: A null pointer dereference was addressed through improved input validation. CVE-2016-1865 : CESG, Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent
libc++abi Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with root privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4621 : an anonymous researcher
libexpat Available for: OS X El Capitan v10.11 and later Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-0718 : Gustavo Grieco
LibreSSL Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple issues existed in LibreSSL before 2.2.7. These were addressed by updating LibreSSL to version 2.2.7. CVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google) Mark Brand, Ian Beer of Google Project Zero CVE-2016-2109 : Brian Carpenter
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: An access issue existed in the parsing of maliciously crafted XML files. This issue was addressed through improved input validation. CVE-2016-4449 : Kostya Serebryany
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Multiple vulnerabilities in libxml2 Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-1836 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-4447 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-4448 : Apple CVE-2016-4483 : Gustavo Grieco CVE-2016-4614 : Nick Wellnhofe CVE-2016-4615 : Nick Wellnhofer CVE-2016-4616 : Michael Paddon CVE-2016-4619 : Hanno Boeck
libxslt Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Multiple vulnerabilities in libxslt Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-1684 : Nicolas GrA(c)goire CVE-2016-4607 : Nick Wellnhofer CVE-2016-4608 : Nicolas GrA(c)goire CVE-2016-4609 : Nick Wellnhofer CVE-2016-4610 : Nick Wellnhofer CVE-2016-4612 : Nicolas GrA(c)goire
Login Window Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to execute arbitrary code leading to compromise of user information Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4640 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
Login Window Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to execute arbitrary code leading to the compromise of user information Description: A type confusion issue was addressed through improved memory handling. CVE-2016-4641 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
Login Window Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to cause a denial of service Description: A memory initialization issue was addressed through improved memory handling. CVE-2016-4639 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
Login Window Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to gain root privileges Description: A type confusion issue was addressed through improved memory handling. CVE-2016-4638 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
OpenSSL Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple issues existed in OpenSSL. These issues were resolved by backporting the fixes from OpenSSL 1.0.2h/1.0.1 to OpenSSL 0.9.8. CVE-2016-2105 : Guido Vranken CVE-2016-2106 : Guido Vranken CVE-2016-2107 : Juraj Somorovsky CVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google), Mark Brand and Ian Beer of Google Project Zero CVE-2016-2109 : Brian Carpenter CVE-2016-2176 : Guido Vranken
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted FlashPix Bitmap Image may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4596 : Ke Liu of Tencent's Xuanwu Lab CVE-2016-4597 : Ke Liu of Tencent's Xuanwu Lab CVE-2016-4600 : Ke Liu of Tencent's Xuanwu Lab CVE-2016-4602 : Ke Liu of Tencent's Xuanwu Lab
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4598 : Ke Liu of Tencent's Xuanwu Lab
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted SGI file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4601 : Ke Liu of Tencent's Xuanwu Lab
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted Photoshop document may lead to unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4599 : Ke Liu of Tencent's Xuanwu Lab
Safari Login AutoFill Available for: OS X El Capitan v10.11 and later Impact: A user's password may be visible on screen Description: An issue existed in Safari's password auto-fill. This issue was addressed through improved matching of form fields. CVE-2016-4595 : Jonathan Lewis from DeARX Services (PTY) LTD
Sandbox Profiles Available for: OS X El Capitan v10.11 and later Impact: A local application may be able to access the process list Description: An access issue existed with privileged API calls. This issue was addressed through additional restrictions. CVE-2016-4594 : Stefan Esser of SektionEins
Note: OS X El Capitan 10.11.6 includes the security content of Safari 9.1.2. For further details see https://support.apple.com/kb/HT206900
OS X El Capitan v10.11.6 and Security Update 2016-004 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJXjXAvAAoJEIOj74w0bLRG/5EP/2v9SJTrO+/4b3A1gqC1ch8y +cJ04tXRsO7rvjKT5nCylo30U0Sanz/bUbDx4559YS7/P/IyeyZVheaTJwK8wzEy pSOPpy35hUuVIw0/p4YsuHDThSBPFMmDljTxH7elkfuBV1lPSrCkyDXc0re2HxWV xj68zAxtM0jkkhgcxb2ApZSZVXhrjUZtbY0xEVOoWKKFwbMvKfx+4xSqunwQeS1u wevs1EbxfvsZbc3pG+xYcOonbegBzOy9aCvNO1Yv1zG+AYXC5ERMq1vk3PsWOTQN ZVY1I7mvCaEfvmjq2isRw8XYapAIKISDLwMKBSYrZDQFwPQLRi1VXxQZ67Kq1M3k ah04/lr0RIcoosIcBqxD2+1UAFjUzEUNFkYivjhuaeegN2QdL7Ujegf1QjdAt8lk mmKduxYUDOaRX50Kw7n14ZveJqzE1D5I6QSItaZ9M1vR60a7u91DSj9D87vbt1YC JM/Rvf/4vonp1NjwA2JQwCiZfYliBDdn9iiCl8mzxdsSRD/wXcZCs05nnKmKsCfc 55ET7IwdG3622lVheOJGQZuucwJiTn36zC11XVzZysQd/hLD5rUKUQNX1WOgZdzs xPsslXF5MWx9jcdyWVSWxDrN0sFk+GpQFQDuVozP60xuxqR3qQ0TXir2NP39uIF5 YozOGPQFmX0OviWCQsX6 =ng+m -----END PGP SIGNATURE----- .
The References section of this erratum contains a download link (you must log in to download the update)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0078", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux hpc node eus", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.4" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.2" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "openssl", "scope": "lte", "trust": 1.0, "vendor": "openssl", "version": "1.0.1n" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "5.0" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.4.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "6.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.2.2" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.4.3" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.1.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.3.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "6.0.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "5.1.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.4.2" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.3" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.3" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "5.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "5.0.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0.4" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2a" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.2.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.1" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "4.0" }, { "model": "esmpro/serveragentservice", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "all versions (linux)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 7)" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "foundation v8.2 to v8.5" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 7)" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 6)" }, { "model": "ucosminexus developer standard", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "enterprise linux hpc node eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 7.2)" }, { "model": "android", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v3.0" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "/sg series univerge sg3000lg/lj" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v6.2" }, { "model": "cosminexus developer version 5", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 7)" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v7.1" }, { "model": "cosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base version 6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 7.2)" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.0.2" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "7.0" }, { "model": "hpe helion openstack", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "2.1" }, { "model": "cosminexus developer standard version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional for plug-in" }, { "model": "web server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- messaging" }, { "model": "ip38x/3000", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "cosminexus application server version 5", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ip38x/1200", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.0.1o" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard v8.2 to v9.4" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v3.1" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "netvisorpro 6.1" }, { "model": "ip38x/810", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "webotx enterprise service bus", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v8.2 to v9.3" }, { "model": "ip38x/n500", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "ucosminexus developer light", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "/sg series sg3600lm/lg/lj v6.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 6)" }, { "model": "cosminexus developer light version 6", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard-r" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 6)" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "capssuite", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v3.0 to v4.0" }, { "model": "univerge", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "business connect v7.1.1" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v4.0" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.11 and later" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 7.2)" }, { "model": "ip38x/sr100", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "hpe helion openstack", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "2.1.2" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 6)" }, { "model": "cosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v8.0" }, { "model": "hpe helion openstack", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "2.0" }, { "model": "websam", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "6.2" }, { "model": "enterprisedirectoryserver", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ver6.1 to v8.0" }, { "model": "secureware/pki application development kit", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ver3.2" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v7.0" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "/sg series intersecvm/sg v1.2" }, { "model": "ip38x/1210", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "ucosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "express v8.2 to v9.4" }, { "model": "ucosminexus service architect", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 7)" }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "express" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v8.2 to v9.4" }, { "model": "web server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- security enhancement" }, { "model": "hpe helion openstack", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "2.1.4" }, { "model": "ip38x/3500", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "ip38x/fw120", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "01" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.0.1" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.0.2c" }, { "model": "ip38x/5000", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "ucosminexus application server standard", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v8.2" }, { "model": "ucosminexus application server smart edition", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "registered envelope service", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "paging server", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "11.5.1" }, { "model": "nexus series switches 5.2 sv3", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": "1000v" }, { "model": "network performance analytics", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "ironport encryption appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "0" }, { "model": "spa51x series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mate collector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ata series analog terminal adaptor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1900" }, { "model": "video surveillance series ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "security network controller 1.0.3361m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "telepresence server on virtual machine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "network health framework", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "spa232d multi-line dect ata", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(1)" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.2.1" }, { "model": "unified series ip phones", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "780011.5.2" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.0" }, { "model": "clean access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "purview", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "7.0" }, { "model": "lancope stealthwatch flowcollector netflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(3.10000.9)" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.6(3)" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.3" }, { "model": "proactive network operations center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence server mr2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "87104.2" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.40" }, { "model": "emergency responder", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "video distribution suite for internet streaming", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.3.2" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.6.0" }, { "model": "video surveillance media server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "project openssl 1.0.1e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "protectier entry edition ts7610 ts7620", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-/2.4" }, { "model": "lancope stealthwatch udp director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.2" }, { "model": "xenserver service pack", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.21" }, { "model": "nexus series blade switches 0.9.8zf", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4000" }, { "model": "protectier gateway for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "telepresence isdn link", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.1.6" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "telepresence sx series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.3.7" }, { "model": "tandberg codian isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32400" }, { "model": "project openssl 1.0.1a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.5.1.6" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.51" }, { "model": "helion openstack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "telepresence mcu", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "85100" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.5.1.131" }, { "model": "unified workforce optimization", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.1" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "lancope stealthwatch flowcollector netflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.1" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.2" }, { "model": "mediasense 9.0", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "abyp-4tl-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "cognos business intelligence interim fix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.1.119" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1209" }, { "model": "asr series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "protectier appliance edition ts7650ap1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.1" }, { "model": "helion openstack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.0" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3400" }, { "model": "enterprise content delivery system", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.6.8" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.2" }, { "model": "prime collaboration assurance sp1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(1)" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.16" }, { "model": "unified contact center enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "88310" }, { "model": "intelligent automation for cloud", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.4" }, { "model": "jabber guest", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3361" }, { "model": "unified ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "69010" }, { "model": "prime security manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.5.4.3" }, { "model": "protectier appliance edition ts7650ap1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.4" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.13-34" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "16.1" }, { "model": "im and presence service", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "ata analog telephone adaptor", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1879.2.5" }, { "model": "jabber guest", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ucs central 1.5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5(2)" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2" }, { "model": "cloud manager with openstack interim fix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.3" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "prime collaboration deployment", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "series ip phones vpn feature", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8800-11.5.2" }, { "model": "mobile foundation consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.1" }, { "model": "web security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3394" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.2" }, { "model": "visual quality experience server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "protectier enterprise edition ts7650g", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.3" }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.14.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "anyconnect secure mobility client for windows", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "websphere application server ~~liberty", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.3-" }, { "model": "agent for openflow", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "protectier gateway for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.1.0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.1" }, { "model": "webex recording playback client", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime collaboration assurance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asa next-generation firewall services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence content server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "tandberg codian mse model", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "83200" }, { "model": "local collector appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.2" }, { "model": "sterling connect:direct for hp nonstop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.1" }, { "model": "digital media players series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44000" }, { "model": "mds series multilayer switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90008.3" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.16-37" }, { "model": "nexus series switches 7.3.1nx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "opensuse evergreen", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.4" }, { "model": "prime infrastructure standalone plug and play gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "identifi wireless", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "10.11" }, { "model": "webex meetings for blackberry", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "spa50x series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "project openssl 1.0.1o", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.3" }, { "model": "lancope stealthwatch flowcollector sflow", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "project openssl 1.0.1g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "media experience engines", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.5.1" }, { "model": "exalogic infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.4" }, { "model": "telepresence integrator c series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.3.7" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "anyconnect secure mobility client", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.1" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "telepresence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "87100" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.1" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4-23" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.25-57" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.14.0" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.18-43" }, { "model": "helion openstack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "cloud manager with openstack interim fix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.5" }, { "model": "workload deployer if12", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.7" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "media services interface", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "nexus intercloud", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v0" }, { "model": "media experience engines", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.5" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.0" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "16.1.3" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.1" }, { "model": "ips", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "project openssl 1.0.1i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.4.2" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70000" }, { "model": "unified workforce optimization quality management sr3 es5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "qradar", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "meetingplace", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.7" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.1" }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.2" }, { "model": "protectier entry edition ts7610 ts7620", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-/3.1" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.913" }, { "model": "xenserver common criteria", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.0.2" }, { "model": "unified attendant console advanced", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime access registrar", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.0.1.7" }, { "model": "webex messenger service ep1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.9.9" }, { "model": "anyconnect secure mobility client for ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.3" }, { "model": "mediasense", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.1" }, { "model": "unified ip phone 9.4.2sr3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8961" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.1" }, { "model": "unified wireless ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.0-" }, { "model": "spa122 ata with router", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.4.5" }, { "model": "media experience engines", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "webex meeting center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.9.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "lancope stealthwatch flowcollector netflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "webex node for mcs", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.12.9.8" }, { "model": "jabber for android", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "video surveillance 4300e/4500e high-definition ip cameras", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.2.8" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "cloud manager with openstack interix fix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.3" }, { "model": "unified sip proxy", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2(1)" }, { "model": "tandberg codian isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32100" }, { "model": "identifi", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "10.01" }, { "model": "unified attendant console premium edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media players series 5.4 rb", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4300" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.11-28" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "qradar", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.31" }, { "model": "prime optical for sps", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "pureapplication system", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.2.1" }, { "model": "project openssl 1.0.2c", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "abyp-2t-1s-1l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "mds series multilayer switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90006.2.17" }, { "model": "icewall sso agent option", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10" }, { "model": "nac appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "7.0" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.19" }, { "model": "security network controller 1.0.3350m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "anyconnect secure mobility client for linux", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5.0.997" }, { "model": "anyconnect secure mobility client for os", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "x4.3" }, { "model": "unified ip phone series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "79000" }, { "model": "anyconnect secure mobility client for android", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "lancope stealthwatch flowsensor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "connected analytics for collaboration 1.0.1q", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.20" }, { "model": "jabber guest", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "abyp-2t-1s-1l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(2)" }, { "model": "identifi wireless", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "10.11.1" }, { "model": "lancope stealthwatch flowcollector sflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.7.3" }, { "model": "mmp server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.2" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.30.0-13" }, { "model": "abyp-10g-2sr-2lr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "computer telephony integration object server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.51" }, { "model": "unified communications for microsoft lync", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.6.7" }, { "model": "prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3.4.2-4" }, { "model": "anyres live", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.14" }, { "model": "ons series multiservice provisioning platforms", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1545410.6.1" }, { "model": "protectier enterprise edition ts7650g", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.2" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70104.4" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.14.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.7.0" }, { "model": "packet tracer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "unified attendant console business edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "agent for openflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.0.7" }, { "model": "cloud manager with openstack interim fix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.5" }, { "model": "cognos business intelligence interim fix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "10.2.117" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.51" }, { "model": "tandberg codian isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32200" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(3)" }, { "model": "webex meetings for wp8", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "abyp-2t-2s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.6.5" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5.0" }, { "model": "webex meetings for android", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "mds series multilayer switches 7.3.1nx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9000" }, { "model": "mds series multilayer switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "ios software and cisco ios xe software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "16.3.1" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.2" }, { "model": "webex meeting center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.9.0.5" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.01" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.15-36" }, { "model": "ace application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "300" }, { "model": "lancope stealthwatch flowsensor", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.7.3" }, { "model": "exalogic infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0" }, { "model": "proventia network enterprise scanner", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.4" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "local collector appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.2.10" }, { "model": "enterprise content delivery system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(1)" }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network controller 1.0.3387m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.11" }, { "model": "mobile foundation consumer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "prime collaboration deployment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "webex meetings client hosted t31r1sp6", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "cloud manager with openstack interim fix1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.6" }, { "model": "dx series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "virtualization experience media engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network controller 1.0.3379m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "video surveillance series ip cameras", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "60002.8" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3x000" }, { "model": "packet tracer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3" }, { "model": "unified sip proxy", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "abyp-0t-4s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.0.1" }, { "model": "spa50x series ip phones", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.5" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "16.1.2" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "abyp-4ts-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "ata series analog terminal adaptor", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1901.3" }, { "model": "digital media players series 5.4 rb", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4400" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.4" }, { "model": "virtualization experience media engine", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.1" }, { "model": "abyp-10g-4lr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "telepresence server on multiparty media", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3200" }, { "model": "abyp-10g-4lr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "sterling connect:direct for hp nonstop ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.6.0.1030" }, { "model": "video surveillance ptz ip cameras", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.8" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6" }, { "model": "unified communications for microsoft lync", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "jabber software development kit", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "spa122 ata with router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.4" }, { "model": "identity services engine", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.2.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "webex meetings server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.7" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.2.2" }, { "model": "rackswitch g8124/g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.7.0" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "16.2" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(2.10000.5)" }, { "model": "project openssl 1.0.1c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.0" }, { "model": "telepresence mx series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.3.7" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "telepresence server on multiparty media", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3204.4" }, { "model": "helion openstack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "qradar siem/qrif/qrm/qvm patch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.2.71" }, { "model": "rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.23.0" }, { "model": "digital media players series 5.3 rb", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4300" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1768" }, { "model": "lancope stealthwatch flowcollector sflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8" }, { "model": "telepresence profile series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.3.7" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.41" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v5000-" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.3.5" }, { "model": "abyp-0t-0s-4l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11.6" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "project openssl 1.0.1f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "nexus series switches 7.3.1nx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7000" }, { "model": "jabber for android mr", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.6" }, { "model": "project openssl 1.0.2a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.6-" }, { "model": "abyp-4t-0s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5.00" }, { "model": "algo audit and compliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "connected grid router-cgos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.5" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "21.1.1" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2919" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.2-" }, { "model": "eos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "8.61.1" }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "lancope stealthwatch smc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence server on virtual machine mr2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "anyconnect secure mobility client", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "unified ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "69450" }, { "model": "nexus series switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "60008.3" }, { "model": "netsight appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.30.2-9" }, { "model": "abyp-0t-2s-2l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "nexus series switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70008.3" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.2" }, { "model": "webex meetings server ssl gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "lancope stealthwatch flowcollector sflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "messagesight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "prime network services controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ironport email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "prime collaboration provisioning", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.2" }, { "model": "protectier gateway for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4" }, { "model": "lancope stealthwatch flowsensor", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "spa30x series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "helion openstack", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "21.1.2" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.30-12" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "webex meetings client on premises", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.3" }, { "model": "telepresence server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70100" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.3(1)" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.4" }, { "model": "rackswitch g8124/g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.17.0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.2" }, { "model": "protectier appliance edition ts7650ap1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.3" }, { "model": "security manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.12" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.0" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.7" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.2" }, { "model": "rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.7.0" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.5(.1.131)" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.5.5" }, { "model": "purview", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3" }, { "model": "prime access registrar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(1)" }, { "model": "prime lan management solution", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "algo audit and compliance if", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.32" }, { "model": "spa525g", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rackswitch g8264t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.17.0" }, { "model": "cloud manager with openstack interim fix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.4" }, { "model": "lancope stealthwatch flowsensor", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.1" }, { "model": "summit wm3000 series", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "0" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "protectier gateway for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "protectier enterprise edition ts7650g", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-1.2" }, { "model": "abyp-0t-2s-2l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.1" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "unified attendant console department edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified ip phone 9.4.2sr3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9971" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.29-9" }, { "model": "series ip phones vpn feature", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8800-0" }, { "model": "protectier gateway for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.3" }, { "model": "abyp-2t-0s-2l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "nexus series switches 7.3.1dx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6000" }, { "model": "spa112 2-port phone adapter", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.4.5" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.6" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3387" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.1.1" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.8-" }, { "model": "abyp-10g-4sr-1-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "webex messenger service", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.20" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "telepresence server mr2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70104.2" }, { "model": "media experience engines", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "protectier appliance edition ts7650ap1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-1.2" }, { "model": "security network controller 1.0.3352m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "video distribution suite for internet streaming", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "connected grid router 15.6.2.15t", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "digital media players series 5.4 rb", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4300" }, { "model": "telepresence server on multiparty media mr2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3204.2" }, { "model": "cloupia unified infrastructure controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "hosted collaboration mediation fulfillment", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5:20" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.1.1" }, { "model": "jabber for mac", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7" }, { "model": "protectier entry edition ts7610 ts7620", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-/3.4" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "agent desktop for cisco unified contact center express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "video surveillance series ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "counter fraud management for safer payments", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.0" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.14.0" }, { "model": "telepresence server on multiparty media mr2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3104.2" }, { "model": "adaptive security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "nexus series switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70006.2.17" }, { "model": "digital media players series 5.3 rb", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4400" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.0" }, { "model": "project openssl 1.0.1n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "telepresence server on multiparty media", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3204.1" }, { "model": "lancope stealthwatch smc", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.7.3" }, { "model": "packet tracer", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.0" }, { "model": "network analysis module", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.3.1" }, { "model": "image construction and composition tool build", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.3.2.028" }, { "model": "video surveillance series ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.17.0" }, { "model": "unified wireless ip phone", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.5.1" }, { "model": "security access manager for web", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "anyconnect secure mobility client for windows", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "virtual security gateway vsg2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.0" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.17" }, { "model": "policy suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "webex meetings client on premises", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-2.7" }, { "model": "spa51x series ip phones", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.5" }, { "model": "unified ip conference phone for third-party call control", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "88310" }, { "model": "unified intelligence center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.1" }, { "model": "telepresence server on virtual machine", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.4" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.0.0" }, { "model": "common services platform collector", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.9.1" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(3.10000.9)" }, { "model": "hosted collaboration mediation fulfillment", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "dcm series 9900-digital content manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "virtual fabric 10gb switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.10.0" }, { "model": "digital media manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.3" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.16" }, { "model": "anyconnect secure mobility client for ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "protectier entry edition ts7610 ts7620", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-/3.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.2" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.0" }, { "model": "telepresence sx series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.1.2" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7" }, { "model": "lancope stealthwatch flowcollector sflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.2" }, { "model": "anyconnect secure mobility client for windows", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "webex meetings client hosted", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.11.7.0" }, { "model": "webex meetings for wp8", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.13" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(2.1)" }, { "model": "webex meetings for wp8", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.6.1" }, { "model": "physical access control gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wide area application services", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.5.7" }, { "model": "webex messenger service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "identifi v7r0", "scope": null, "trust": 0.3, "vendor": "extremenetworks", "version": null }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "prime ip express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mmp server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.10" }, { "model": "application and content networking system", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.5.41" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.4.1.0" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.2.1" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "intelligent automation for cloud", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "0.9.8" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.7-" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "edge digital media player 1.6rb4 5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "300" }, { "model": "mds series multilayer switches 7.3.1dx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9000" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "99510" }, { "model": "abyp-10g-4sr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.6" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "89450" }, { "model": "digital media manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.4.1" }, { "model": "icewall sso dfw", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.0" }, { "model": "lancope stealthwatch flowsensor", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.2" }, { "model": "video surveillance series ip cameras", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "30002.8" }, { "model": "protectier enterprise edition ts7650g", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-2.5" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.12" }, { "model": "webex meeting center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.11" }, { "model": "partner supporting service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "1/10gb uplink ethernet switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4.14.0" }, { "model": "protectier appliance edition ts7650ap1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.2" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.11" }, { "model": "mobility services engine", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "edge digital media player", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3401.2.0.20" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "abyp-0t-4s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "spa30x series ip phones", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.5" }, { "model": "unified series ip phones", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "78000" }, { "model": "datapower gateways", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.2.0.8" }, { "model": "digital media players series 5.4 rb", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4400" }, { "model": "telepresence mcu", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "42000" }, { "model": "security access manager for web", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0.1.0" }, { "model": "identifi", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "9.21.12" }, { "model": "socialminer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.17.0" }, { "model": "standalone rack server cimc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.5" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.0" }, { "model": "spa112 2-port phone adapter", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "lancope stealthwatch smc", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8" }, { "model": "intracer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "jabber for apple ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.6.2" }, { "model": "video surveillance series high-definition ip cameras", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "40002.4.7" }, { "model": "video surveillance media server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.5" }, { "model": "mq appliance m2001", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "telepresence mcu", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "84200" }, { "model": "jabber for windows", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "ironport email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5" }, { "model": "anyconnect secure mobility client for linux", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.112" }, { "model": "meetingplace", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "spa525g", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.5" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.3" }, { "model": "mmp server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.9.0.5" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.4.4" }, { "model": "lancope stealthwatch udp director", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence integrator c series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.1.2" }, { "model": "prime network registrar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloud object store", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.8" }, { "model": "anyconnect secure mobility client for android", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "cognos business intelligence fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.12" }, { "model": "telepresence sx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network controller 1.0.3394m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network controller 1.0.3381m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5.1.5" }, { "model": "registered envelope service", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.0" }, { "model": "lancope stealthwatch smc", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.1" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "99710" }, { "model": "telepresence content server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.2" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5(4)" }, { "model": "meetingplace", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence server on multiparty media", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3104.4" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "image construction and composition tool build", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.3.1.050" }, { "model": "security guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "anyconnect secure mobility client for linux", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.6" }, { "model": "mq appliance m2000", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "ata analog telephone adaptor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1870" }, { "model": "asa cx and prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "universal small cell series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "50003.5.12.21" }, { "model": "project openssl 1.0.1m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.1" }, { "model": "rackswitch g8264cs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.14.0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "expressway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "anyconnect secure mobility client for android", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(1)" }, { "model": "nexus series switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "50007.3.1" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5(3)" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.9-" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.2" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "unified ip phone 9.4.2sr3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8945" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.18-49" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(1.10000.12)" }, { "model": "telepresence ex series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.1.2" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v0" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.3" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.3" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.6" }, { "model": "mate design", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "eos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "7.91.1" }, { "model": "rational insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1.5" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.13-41" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.0.2" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "network admission control", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified communications for microsoft lync", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.6" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.4" }, { "model": "project openssl 1.0.1j", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "universal small cell series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70003.4.2.0" }, { "model": "application policy infrastructure controller", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.0(0.400)" }, { "model": "protectier enterprise edition ts7650g", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.1" }, { "model": "nexus series switches 7.3.1dx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "protectier entry edition ts7610 ts7620", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-/2.5" }, { "model": "telepresence conductor", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "abyp-0t-0s-4l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "unified attendant console standard", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.115" }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.1" }, { "model": "jazz reporting service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "connected grid routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mate live", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.13" }, { "model": "sterling connect:direct for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.5(.1.6)" }, { "model": "telepresence integrator c series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified workforce optimization sr3 es5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "project openssl 1.0.1d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "unified communications manager 10.5 su3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "jazz reporting service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "protectier entry edition ts7610 ts7620", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-/3.3" }, { "model": "protectier enterprise edition ts7650g", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-3.4" }, { "model": "abyp-4tl-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "abyp-2t-2s-0l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "nac server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3381" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9-34" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.3" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "22.1" }, { "model": "abyp-4ts-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "digital media players series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "43000" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.11" }, { "model": "telepresence server on multiparty media", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3100" }, { "model": "security proventia network active bypass 0343c3c", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "cloud manager with openstack interim fix1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.3.0.6" }, { "model": "unified ip phones 9.3 sr3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6901" }, { "model": "digital media manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.3.6" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.0(0.98000.225)" }, { "model": "prime network", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "anyconnect secure mobility client for ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "prime performance manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "prime collaboration provisioning", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "protectier gateway for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.3" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "unity connection", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.17.0" }, { "model": "telepresence video communication server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.8" }, { "model": "lancope stealthwatch flowcollector netflow", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "lancope stealthwatch smc", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.2" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(1.98991.13)" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.2.0" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.6.4" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "abyp-10g-2sr-2lr-1-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "prime optical for sps", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.6" }, { "model": "protectier enterprise edition ts7650g", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-2.4" }, { "model": "telepresence mcu", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "45000" }, { "model": "telepresence server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "87104.4" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.0" }, { "model": "telepresence isdn gw", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "32410" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.3" }, { "model": "nexus series switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "50008.3" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.2.1" }, { "model": "netflow generation appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "pureapplication system", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.2.3" }, { "model": "telepresence server on multiparty media", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3104.1" }, { "model": "telepresence ex series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "webex meetings server ssl gateway", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-2.7" }, { "model": "protectier appliance edition ts7650ap1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-2.4" }, { "model": "telepresence server on virtual machine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.0.5" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "webex meetings for android", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(1.10000.5)" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.6" }, { "model": "tivoli network manager ip edition fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.94" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "prime license manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3376" }, { "model": "sterling connect:direct for hp nonstop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "protectier entry edition ts7610 ts7620", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-/1.2" }, { "model": "messagesight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.18-42" }, { "model": "video surveillance series ip cameras", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70002.8" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3500-" }, { "model": "expressway series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.8" }, { "model": "abyp-4t-0s-0l-p", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "email security appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.2" }, { "model": "virtual security gateway for microsoft hyper-v vsg2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "connected grid router cgos 15.6.2.15t", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "wide area application services", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "21.1" }, { "model": "unified intelligent contact management enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "nexus series switches 7.3.1nx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6000" }, { "model": "application and content networking system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mmp server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.9.1" }, { "model": "project openssl 1.0.1k", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "anyconnect secure mobility client for ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence mx series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.1.2" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.2" }, { "model": "spa232d multi-line dect ata", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.4.5" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "telepresence profile series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.1.2" }, { "model": "project openssl 1.0.1b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.13" }, { "model": "anyconnect secure mobility client for os", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "x4.2" }, { "model": "lancope stealthwatch udp director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8" }, { "model": "universal small cell series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70003.5.12.21" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3700-" }, { "model": "telepresence conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "application policy infrastructure controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.1-" }, { "model": "jabber for mac", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "dcm series 9900-digital content manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "19.0" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.2.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "unified ip phone 9.4.2sr3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9951" }, { "model": "sterling connect:direct for microsoft windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.0" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.1876" }, { "model": "video surveillance 4300e/4500e high-definition ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "local collector appliance", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.2.12" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "worklight enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.1" }, { "model": "websphere cast iron cloud integration", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.32" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.0.0" }, { "model": "content security appliance updater servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "connected analytics for collaboration", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "multicast manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "lancope stealthwatch flowcollector netflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.7.3" }, { "model": "cognos business intelligence server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "telepresence ex series", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.3.7" }, { "model": "mac os security update", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x2016" }, { "model": "jazz reporting service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "nexus series switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "50006.2.17" }, { "model": "security proventia network active bypass", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.30.4-12" }, { "model": "webex node for mcs", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "emergency responder 10.5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "security identity manager virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.2" }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "qradar siem mr2 patch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.113" }, { "model": "nexus", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "900012.0" }, { "model": "lancope stealthwatch udp director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.8.1" }, { "model": "video surveillance ptz ip cameras", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "virtualization experience media engine", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7(0)" }, { "model": "telepresence serial gateway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "i", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "sterling connect:direct for hp nonstop", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.6" }, { "model": "xenserver service pack", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.51" }, { "model": "webex meetings server 2.5mr2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "protectier appliance edition ts7650ap1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "-2.5" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "services analytic platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "jabber for apple ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7" }, { "model": "unified ip phone series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "79009.4(2)" }, { "model": "netsight appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "7.0" }, { "model": "unified ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "89610" }, { "model": "nexus series switches", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "60006.2.17" }, { "model": "workload deployer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.12" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.5-" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.2" }, { "model": "unified series ip conference phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "88310" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "16.2.1" }, { "model": "security network controller 1.0.3376m", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "video surveillance media server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.9" }, { "model": "unified communications manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "agent for openflow", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "2.1.5" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.5" }, { "model": "virtual security gateway", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2(1)" }, { "model": "protectier gateway for system z", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "unified attendant console enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified contact center express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.3379" }, { "model": "policy suite", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "project openssl 1.0.2b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "prime data center network manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified computing system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "unified communications manager session management edition", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "videoscape control suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence mcu", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "53000" }, { "model": "prime access registrar", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.1" }, { "model": "anyres live", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.4.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "mobilefirst platform foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.0" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(1)" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.10" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.4-" }, { "model": "jabber software development kit", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.7" }, { "model": "unified contact center express", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5.1" }, { "model": "webex meetings server mr1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5" }, { "model": "telepresence mx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "webex meetings server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2.5.99.2" }, { "model": "rational reporting for development intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0.1" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "jazz reporting service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "telepresence isdn gw mse", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "83210" }, { "model": "telepresence profile series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "abyp-2t-0s-2l-p-m", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "visual quality experience tools server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloud manager with openstack interim fix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.3" }, { "model": "prime access registrar", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.2" }, { "model": "nexus series switches 7.3.1dx", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7000" }, { "model": "asa cx and cisco prime security manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.5.4.3" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "project openssl 1.0.1l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.2" }, { "model": "im and presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3" }, { "model": "firesight system software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unity connection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "datapower gateways", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.0.1" }, { "model": "cloud object store", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "anyconnect secure mobility client for os", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "x4.0" }, { "model": "project openssl 1.0.1h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(2.13900.9)" }, { "model": "lancope stealthwatch udp director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.7.3" }, { "model": "ip interoperability and collaboration system", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.5(0.98000.88)" }, { "model": "cloud manager with openstack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.0.1" } ], "sources": [ { "db": "BID", "id": "89752" }, { "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "db": "NVD", "id": "CVE-2016-2108" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:google:android", "vulnerable": true }, { "cpe22Uri": "cpe:/a:openssl:openssl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hp:helion_openstack", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_hpc_node", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_hpc_node_eus", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server_aus", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server_eus", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_workstation", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:capssuite", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:enterprise_directoryserver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:enterpriseidentitymanager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:esmpro_serveragent", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:esmpro_serveragentservice", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:express5800", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_1200", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_1210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_3000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_3500", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_5000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_810", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_fw120", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_n500", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:ip38x_sr100", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:secureware_pki_application_development_kit", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:univerge", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:webotx_application_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:webotx_enterprise_service_bus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:websam", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_application_server_enterprise", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_application_server_standard", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_application_server_version_5", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_light_version_6", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_professional_version_6", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_standard_version_6", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_developer_version_5", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_primary_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:hitachi_web_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server_enterprise", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server_standard", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer_light", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer_standard", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_primary_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_service_architect", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_service_platform", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002475" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "137240" }, { "db": "PACKETSTORM", "id": "136937" }, { "db": "PACKETSTORM", "id": "139114" }, { "db": "PACKETSTORM", "id": "140716" }, { "db": "PACKETSTORM", "id": "139116" } ], "trust": 0.5 }, "cve": "CVE-2016-2108", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2016-2108", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-2108", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-2108", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-2108", "trust": 0.8, "value": "Critical" }, { "author": "VULMON", "id": "CVE-2016-2108", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-2108" }, { "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "db": "NVD", "id": "CVE-2016-2108" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue. OpenSSL is prone to remote memory-corruption vulnerability. \nSuccessfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the application using the vulnerable library. Failed exploit attempts will result in denial-of-service conditions. \nFollowing product versions are affected:\nOpenSSL versions 1.0.2 prior to 1.0.2c\nOpenSSL versions 1.0.1 prior to 1.0.1o. 5 client) - i386, x86_64\n\n3. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201612-16\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: OpenSSL: Multiple vulnerabilities\n Date: December 07, 2016\n Bugs: #581234, #585142, #585276, #591454, #592068, #592074,\n #592082, #594500, #595186\n ID: 201612-16\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, the worst of which\nallows attackers to conduct a time based side-channel attack. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-libs/openssl \u003c 1.0.2j \u003e= 1.0.2j\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in OpenSSL. Please review\nthe CVE identifiers and the International Association for Cryptologic\nResearch\u0027s (IACR) paper, \"Make Sure DSA Signing Exponentiations Really\nare Constant-Time\" for further details. \n\nImpact\n======\n\nRemote attackers could cause a Denial of Service condition or have\nother unspecified impacts. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll OpenSSL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/openssl-1.0.2j\"\n\nReferences\n==========\n\n[ 1 ] CVE-2016-2105\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105\n[ 2 ] CVE-2016-2106\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106\n[ 3 ] CVE-2016-2107\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107\n[ 4 ] CVE-2016-2108\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108\n[ 5 ] CVE-2016-2109\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109\n[ 6 ] CVE-2016-2176\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176\n[ 7 ] CVE-2016-2177\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177\n[ 8 ] CVE-2016-2178\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178\n[ 9 ] CVE-2016-2180\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180\n[ 10 ] CVE-2016-2183\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183\n[ 11 ] CVE-2016-6304\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304\n[ 12 ] CVE-2016-6305\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305\n[ 13 ] CVE-2016-6306\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306\n[ 14 ] CVE-2016-7052\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052\n[ 15 ] Make Sure DSA Signing Exponentiations Really are Constant-Time\n http://eprint.iacr.org/2016/594.pdf\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201612-16\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: openssl security update\nAdvisory ID: RHSA-2016:0722-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-0722.html\nIssue date: 2016-05-09\nCVE Names: CVE-2016-0799 CVE-2016-2105 CVE-2016-2106 \n CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 \n CVE-2016-2842 \n=====================================================================\n\n1. Summary:\n\nAn update for openssl is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and\nTransport Layer Security (TLS) protocols, as well as a full-strength\ngeneral-purpose cryptography library. \n\nSecurity Fix(es):\n\n* A flaw was found in the way OpenSSL encoded certain ASN.1 data\nstructures. An attacker could use this flaw to create a specially crafted\ncertificate which, when verified or re-encoded by OpenSSL, could cause it\nto crash, or execute arbitrary code using the permissions of the user\nrunning an application compiled against the OpenSSL library. \n(CVE-2016-2108)\n\n* Two integer overflow flaws, leading to buffer overflows, were found in\nthe way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL\nparsed very large amounts of input data. \n(CVE-2016-2105, CVE-2016-2106)\n\n* It was discovered that OpenSSL leaked timing information when decrypting\nTLS/SSL and DTLS protocol encrypted records when the connection used the\nAES CBC cipher suite and the server supported AES-NI. A remote attacker\ncould possibly use this flaw to retrieve plain text from encrypted packets\nby using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107)\n\n* Several flaws were found in the way BIO_*printf functions were\nimplemented in OpenSSL. Applications which passed large amounts of\nuntrusted data through these functions could crash or potentially execute\ncode with the permissions of the user running such an application. \n(CVE-2016-0799, CVE-2016-2842)\n\n* A denial of service flaw was found in the way OpenSSL parsed certain\nASN.1-encoded data from BIO (OpenSSL\u0027s I/O abstraction) inputs. An\napplication using OpenSSL that accepts untrusted ASN.1 BIO input could be\nforced to allocate an excessive amount of data. (CVE-2016-2109)\n\nRed Hat would like to thank the OpenSSL project for reporting\nCVE-2016-2108, CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107,\nand CVE-2016-0799. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat),\nHanno B\u00f6ck, and David Benjamin (Google) as the original reporters of\nCVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2842,\nCVE-2016-2105, CVE-2016-2106, and CVE-2016-0799; and Juraj Somorovsky as\nthe original reporter of CVE-2016-2107. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library\nmust be restarted, or the system rebooted. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1312219 - CVE-2016-0799 OpenSSL: Fix memory issues in BIO_*printf functions\n1314757 - CVE-2016-2842 openssl: doapr_outch function does not verify that certain memory allocation succeeds\n1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data\n1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder\n1331426 - CVE-2016-2107 openssl: Padding oracle in AES-NI CBC MAC check\n1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow\n1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.5.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.5.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.5.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.5.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.5.src.rpm\n\nppc64:\nopenssl-1.0.1e-51.el7_2.5.ppc64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.ppc64.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.ppc.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.ppc64.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.ppc.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.ppc64.rpm\n\nppc64le:\nopenssl-1.0.1e-51.el7_2.5.ppc64le.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.ppc64le.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.ppc64le.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.ppc64le.rpm\n\ns390x:\nopenssl-1.0.1e-51.el7_2.5.s390x.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.s390x.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.s390.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.s390x.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.s390.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-51.el7_2.5.ppc.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.ppc64.rpm\nopenssl-perl-1.0.1e-51.el7_2.5.ppc64.rpm\nopenssl-static-1.0.1e-51.el7_2.5.ppc.rpm\nopenssl-static-1.0.1e-51.el7_2.5.ppc64.rpm\n\nppc64le:\nopenssl-debuginfo-1.0.1e-51.el7_2.5.ppc64le.rpm\nopenssl-perl-1.0.1e-51.el7_2.5.ppc64le.rpm\nopenssl-static-1.0.1e-51.el7_2.5.ppc64le.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-51.el7_2.5.s390.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.s390x.rpm\nopenssl-perl-1.0.1e-51.el7_2.5.s390x.rpm\nopenssl-static-1.0.1e-51.el7_2.5.s390.rpm\nopenssl-static-1.0.1e-51.el7_2.5.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-51.el7_2.5.src.rpm\n\nx86_64:\nopenssl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-debuginfo-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm\nopenssl-static-1.0.1e-51.el7_2.5.i686.rpm\nopenssl-static-1.0.1e-51.el7_2.5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-0799\nhttps://access.redhat.com/security/cve/CVE-2016-2105\nhttps://access.redhat.com/security/cve/CVE-2016-2106\nhttps://access.redhat.com/security/cve/CVE-2016-2107\nhttps://access.redhat.com/security/cve/CVE-2016-2108\nhttps://access.redhat.com/security/cve/CVE-2016-2109\nhttps://access.redhat.com/security/cve/CVE-2016-2842\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFXMFlTXlSAg2UNWIIRAhYAAJ0T9Ib2vXUa5te34i6fphHrbe0HlwCfePy5\nWjaK8x9OaI0FgbWyfxvwq6o=\n=jHjh\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. This could lead to a heap corruption. \n This could lead to a heap corruption. \n\nCVE-2016-2107\n\n Juraj Somorovsky discovered a padding oracle in the AES CBC cipher\n implementation based on the AES-NI instruction set. This could allow\n an attacker to decrypt TLS traffic encrypted with one of the cipher\n suites based on AES CBC. \n\nCVE-2016-2108\n\n David Benjamin from Google discovered that two separate bugs in the\n ASN.1 encoder, related to handling of negative zero integer values\n and large universal tags, could lead to an out-of-bounds write. \n\nCVE-2016-2109\n\n Brian Carpenter discovered that when ASN.1 data is read from a BIO\n using functions such as d2i_CMS_bio(), a short invalid encoding can\n casuse allocation of large amounts of memory potentially consuming\n excessive resources or exhausting memory. \n\nCVE-2016-2176\n\n Guido Vranken discovered that ASN.1 Strings that are over 1024 bytes\n can cause an overread in applications using the X509_NAME_oneline()\n function on EBCDIC systems. This could result in arbitrary stack data\n being returned in the buffer. \n\nAdditional information about these issues can be found in the OpenSSL\nsecurity advisory at https://www.openssl.org/news/secadv/20160503.txt\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1.0.1k-3+deb8u5. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1.0.2h-1. \n\nWe recommend that you upgrade your openssl packages. Description:\n\nRed Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7. \n\nThis release includes bug fixes and enhancements, as well as a new release\nof OpenSSL that addresses a number of outstanding security flaws. For\nfurther information, see the knowledge base article linked to in the\nReferences section. The JBoss server process must be restarted for the update\nto take effect. \n(CVE-2016-2108)\n\n* Multiple flaws were found in the way httpd parsed HTTP requests and\nresponses using chunked transfer encoding. A remote attacker could use\nthese flaws to create a specially crafted request, which httpd would decode\ndifferently from an HTTP proxy software in front of it, possibly leading to\nHTTP request smuggling attacks. (CVE-2015-3195)\n\n* A flaw was found in the way the TLS protocol composes the Diffie-Hellman\nexchange (for both export and non-export grade cipher suites). An attacker\ncould use this flaw to downgrade a DHE connection to use export-grade key\nsizes, which could then be broken by sufficient pre-computation. This can\nlead to a passive man-in-the-middle attack in which the attacker is able to\ndecrypt all traffic. (CVE-2016-2106)\n\n* It was discovered that it is possible to remotely Segfault Apache http\nserver with a specially crafted string sent to the mod_cluster via service\nmessages (MCMP). (CVE-2016-2109)\n\n* It was discovered that specifying configuration with a JVMRoute path\nlonger than 80 characters will cause segmentation fault leading to a server\ncrash. Description:\n\nThis release adds the new Apache HTTP Server 2.4.23 packages that are part\nof the JBoss Core Services offering. \n(CVE-2016-2108)\n\n* It was found that the length checks prior to writing to the target buffer\nfor creating a virtual host mapping rule did not take account of the length\nof the virtual host name, creating the potential for a buffer overflow. \n(CVE-2016-6808)\n\n* It was discovered that OpenSSL did not always use constant time\noperations when computing Digital Signature Algorithm (DSA) signatures. (CVE-2016-4459)\n\n* An error was found in protocol parsing logic of mod_cluster load balancer\nApache HTTP Server modules. An attacker could use this flaw to cause a\nSegmentation Fault in the serving httpd process. After installing the updated\npackages, the httpd daemon will be restarted automatically. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03765en_us\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: hpesbhf03765en_us\nVersion: 1\n\nHPESBHF03765 rev.1 - HPE ConvergedSystem 700 Solution with Comware v7 Switches using OpenSSL, Remote Denial of Service (DoS) and Disclosure of Sensitive Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2017-07-20\nLast Updated: 2017-07-20\n\nPotential Security Impact: Remote: Denial of Service (DoS), Disclosure of Sensitive Information\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities in OpenSSL have been addressed in HPE Network Products including Comware v7 that is applicable for ConvergedSystem\n700 solutions. The vulnerabilities could be remotely exploited resulting in Denial of Service (DoS) or disclosure of sensitive information. \n\n - HP ConvergedSystem 700 for Virtualization 1.0\n - HP ConvergedSystem 700 for Virtualization 1.1 1.1\n - HP ConvergedSystem 700 Virtualization 2.0 Foundation Kit 2.0\n - HP ConvergedSystem 700 Virtualization 2.0 VMware Kit 2.0\n - HP ConvergedSystem 700x 1.0\n - HP ConvergedSystem 700x for Microsoft Solution Kit 1.0\n - HP ConvergedSystem 700x v1.1 Microsoft Kit 1.1\n - HP ConvergedSystem 700x v1.1 VMware Kit 1.1\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2016-2105\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)\n\n CVE-2016-2106\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)\n\n CVE-2016-2107\n 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\n 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N)\n\n CVE-2016-2108\n 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)\n\n CVE-2016-2109\n 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)\n\n CVE-2016-2176\n 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\n 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE recommends upgrading your network switches to Comware v7 Version R2422P02 which is part of the HPE ConvergedSystem 700 Solution as listed below:\n\n* CS700/CS700x 1.0 and 1.1 solution:\n + HPN 5900 Switch (JG510A/JH038A) (JC772A/JG554A) (JG296A)\n\n* CS700 2.0 solution:\n + HPE FlexFabric 5930 Switch 4slot (JH179A/JH188A) 2slot+2QSFP+\n(JH178A/JH187A)\n\n* HPE has provided the following Customer Notice that includes links to documentation to assist you in maintaining your HPE ConvergedSystem 700\nsolution:\n\n +\n\u003chttp://h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-a00006123en_\ns\u003e\n \n**Note:** Please contact HPE Technical Support if any assistance is needed acquiring the software updates. \n\nHISTORY\nVersion:1 (rev.1) - 21 July 2017 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in the title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update\n2016-004\n\nOS X El Capitan v10.11.6 and Security Update 2016-004 is now\navailable and addresses the following:\n\napache_mod_php\nAvailable for: \nOS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple issues existed in PHP versions prior to\n5.5.36. These were addressed by updating PHP to version 5.5.36. \nCVE-2016-4650\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-2016-4647 : Juwei Lin (@fuzzerDOTcn) of Trend Micro\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An out-of-bounds read was addressed through improved\ninput validation. \nCVE-2016-4648 : Juwei Lin(@fuzzerDOTcn) of Trend Micro\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Parsing a maliciously crafted audio file may lead to the\ndisclosure of user information\nDescription: An out-of-bounds read was addressed through improved\nbounds checking. \nCVE-2016-4646 : Steven Seeley of Source Incite working with Trend\nMicro\u0027s Zero Day Initiative\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to cause a system denial of service\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-2016-4649 : Juwei Lin(@fuzzerDOTcn) of Trend Micro\n\nbsdiff\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An integer overflow existed in bspatch. This issue was\naddressed through improved bounds checking. \nCVE-2014-9862 : an anonymous researcher\n\nCFNetwork\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to view sensitive user information\nDescription: A permissions issue existed in the handling of web\nbrowser cookies. This issue was addressed through improved\nrestrictions. \nCVE-2016-4645 : Abhinav Bansal of Zscaler Inc. \n\nCoreGraphics\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-2016-4637 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\n\nCoreGraphics\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to elevate privileges\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-2016-4652 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nFaceTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: An attacker in a privileged network position may be able to\ncause a relayed call to continue transmitting audio while appearing\nas if the call terminated\nDescription: User interface inconsistencies existed in the handling\nof relayed calls. These issues were addressed through improved\nFaceTime display logic. \nCVE-2016-4635 : Martin Vigo\n\nGraphics Drivers\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4634 : Stefan Esser of SektionEins\n\nImageIO\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to cause a denial of service\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2016-4632 : Evgeny Sidorov of Yandex\n\nImageIO\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4631 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\n\nImageIO\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4629 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\nCVE-2016-4630 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with kernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4633 : an anonymous researcher\n\nIOHIDFamily\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-2016-4626 : Stefan Esser of SektionEins\n\nIOSurface\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A use-after-free was addressed through improved memory\nmanagement. \nCVE-2016-4625 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-1863 : Ian Beer of Google Project Zero\nCVE-2016-1864 : Ju Zhu of Trend Micro\nCVE-2016-4582 : Shrek_wzw and Proteas of Qihoo 360 Nirvan Team\n\nKernel\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to cause a system denial of service\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-2016-1865 : CESG, Marco Grassi (@marcograss) of KeenLab\n(@keen_lab), Tencent\n\nlibc++abi\nAvailable for: OS X El Capitan v10.11 and later\nImpact: An application may be able to execute arbitrary code with\nroot privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4621 : an anonymous researcher\n\nlibexpat\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing maliciously crafted XML may lead to unexpected\napplication termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-0718 : Gustavo Grieco\n\nLibreSSL\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple issues existed in LibreSSL before 2.2.7. These\nwere addressed by updating LibreSSL to version 2.2.7. \nCVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google) Mark Brand,\nIan Beer of Google Project Zero\nCVE-2016-2109 : Brian Carpenter\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: Parsing a maliciously crafted XML document may lead to\ndisclosure of user information\nDescription: An access issue existed in the parsing of maliciously\ncrafted XML files. This issue was addressed through improved input\nvalidation. \nCVE-2016-4449 : Kostya Serebryany\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: Multiple vulnerabilities in libxml2\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-1836 : Wei Lei and Liu Yang of Nanyang Technological\nUniversity\nCVE-2016-4447 : Wei Lei and Liu Yang of Nanyang Technological\nUniversity\nCVE-2016-4448 : Apple\nCVE-2016-4483 : Gustavo Grieco\nCVE-2016-4614 : Nick Wellnhofe\nCVE-2016-4615 : Nick Wellnhofer\nCVE-2016-4616 : Michael Paddon\nCVE-2016-4619 : Hanno Boeck\n\nlibxslt\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: Multiple vulnerabilities in libxslt\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-1684 : Nicolas GrA(c)goire\nCVE-2016-4607 : Nick Wellnhofer\nCVE-2016-4608 : Nicolas GrA(c)goire\nCVE-2016-4609 : Nick Wellnhofer\nCVE-2016-4610 : Nick Wellnhofer\nCVE-2016-4612 : Nicolas GrA(c)goire\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to execute arbitrary\ncode leading to compromise of user information\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4640 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to execute arbitrary\ncode leading to the compromise of user information\nDescription: A type confusion issue was addressed through improved\nmemory handling. \nCVE-2016-4641 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to cause a denial of service\nDescription: A memory initialization issue was addressed through\nimproved memory handling. \nCVE-2016-4639 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to gain root privileges\nDescription: A type confusion issue was addressed through improved\nmemory handling. \nCVE-2016-4638 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nOpenSSL\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple issues existed in OpenSSL. These issues were resolved by backporting the fixes from OpenSSL 1.0.2h/1.0.1 to OpenSSL 0.9.8. \nCVE-2016-2105 : Guido Vranken\nCVE-2016-2106 : Guido Vranken\nCVE-2016-2107 : Juraj Somorovsky\nCVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google), Mark Brand and Ian Beer of Google Project Zero\nCVE-2016-2109 : Brian Carpenter\nCVE-2016-2176 : Guido Vranken\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted FlashPix Bitmap Image may\nlead to unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4596 : Ke Liu of Tencent\u0027s Xuanwu Lab\nCVE-2016-4597 : Ke Liu of Tencent\u0027s Xuanwu Lab\nCVE-2016-4600 : Ke Liu of Tencent\u0027s Xuanwu Lab\nCVE-2016-4602 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4598 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted SGI file may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4601 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted Photoshop document may lead\nto unexpected application termination or arbitrary code execution\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4599 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nSafari Login AutoFill\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A user\u0027s password may be visible on screen\nDescription: An issue existed in Safari\u0027s password auto-fill. This\nissue was addressed through improved matching of form fields. \nCVE-2016-4595 : Jonathan Lewis from DeARX Services (PTY) LTD\n\nSandbox Profiles\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local application may be able to access the process list\nDescription: An access issue existed with privileged API calls. This\nissue was addressed through additional restrictions. \nCVE-2016-4594 : Stefan Esser of SektionEins\n\nNote: OS X El Capitan 10.11.6 includes the security content of Safari\n9.1.2. For further details see https://support.apple.com/kb/HT206900\n\n\nOS X El Capitan v10.11.6 and Security Update 2016-004 may be obtained\nfrom the Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nYozOGPQFmX0OviWCQsX6\n=ng+m\n-----END PGP SIGNATURE-----\n. \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update)", "sources": [ { "db": "NVD", "id": "CVE-2016-2108" }, { "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "db": "BID", "id": "89752" }, { "db": "VULMON", "id": "CVE-2016-2108" }, { "db": "PACKETSTORM", "id": "137240" }, { "db": "PACKETSTORM", "id": "141029" }, { "db": "PACKETSTORM", "id": "140056" }, { "db": "PACKETSTORM", "id": "136937" }, { "db": "PACKETSTORM", "id": "136893" }, { "db": "PACKETSTORM", "id": "139114" }, { "db": "PACKETSTORM", "id": "140716" }, { "db": "PACKETSTORM", "id": "143513" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "139116" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-2108", "trust": 3.2 }, { "db": "BID", "id": "89752", "trust": 1.4 }, { "db": "PULSESECURE", "id": "SA40202", "trust": 1.1 }, { "db": "SIEMENS", "id": "SSA-412672", "trust": 1.1 }, { "db": "BID", "id": "91787", "trust": 1.1 }, { "db": "TENABLE", "id": "TNS-2016-18", "trust": 1.1 }, { "db": "SECTRACK", "id": "1035721", "trust": 1.1 }, { "db": "JUNIPER", "id": "JSA10759", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "136912", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU93163809", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU94844193", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-002475", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-22-349-21", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-2108", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137240", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141029", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140056", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136937", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136893", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "139114", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140716", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "143513", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137958", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "139116", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-2108" }, { "db": "BID", "id": "89752" }, { "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "db": "PACKETSTORM", "id": "137240" }, { "db": "PACKETSTORM", "id": "141029" }, { "db": "PACKETSTORM", "id": "140056" }, { "db": "PACKETSTORM", "id": "136937" }, { "db": "PACKETSTORM", "id": "136893" }, { "db": "PACKETSTORM", "id": "139114" }, { "db": "PACKETSTORM", "id": "140716" }, { "db": "PACKETSTORM", "id": "143513" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "139116" }, { "db": "NVD", "id": "CVE-2016-2108" } ] }, "id": "VAR-201605-0078", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4191189390909091 }, "last_update_date": "2024-11-29T22:18:45.868000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android Security Bulletin-July 2016", "trust": 0.8, "url": "http://source.android.com/security/bulletin/2016-07-01.html" }, { "title": "APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "title": "HT206903", "trust": 0.8, "url": "https://support.apple.com/en-us/HT206903" }, { "title": "HT206903", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT206903" }, { "title": "HPSBGN03620", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05164862" }, { "title": "HPSBGN03610", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05149345" }, { "title": "SB10160", "trust": 0.8, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10160" }, { "title": "NV16-015", "trust": 0.8, "url": "http://jpn.nec.com/security-info/secinfo/nv16-015.html" }, { "title": "OpenSSL 1.0.1 Series Release Notes", "trust": 0.8, "url": "https://www.openssl.org/news/openssl-1.0.1-notes.html" }, { "title": "OpenSSL 1.0.2 Series Release Notes", "trust": 0.8, "url": "https://www.openssl.org/news/openssl-1.0.2-notes.html" }, { "title": "Fix encoding bug in i2c_ASN1_INTEGER", "trust": 0.8, "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871" }, { "title": "Fix ASN1_INTEGER handling.", "trust": 0.8, "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27" }, { "title": "Memory corruption in the ASN.1 encoder (CVE-2016-2108)", "trust": 0.8, "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "title": "Oracle Critical Patch Update Advisory - July 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "title": "Oracle Linux Bulletin - April 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "title": "Oracle Solaris Third Party Bulletin - April 2016", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "title": "RHSA-2016:0722", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2016-0722.html" }, { "title": "RHSA-2016:0996", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2016-0996.html" }, { "title": "SA40202", "trust": 0.8, "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202" }, { "title": "JSA10759", "trust": 0.8, "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "title": "TLSA-2016-14", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2016/TLSA-2016-14j.html" }, { "title": "\u30b5\u30fc\u30d0\u30fb\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u88fd\u54c1\u306b\u304a\u3051\u308bOpenSSL\u306e\u8106\u5f31\u6027(CVE-2016-2108)\u306b\u3088\u308b\u5f71\u97ff\u306b\u3064\u3044\u3066 (hitachi-sec-2016-201)", "trust": 0.8, "url": "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/openssl_cve2016-2108.html" }, { "title": "HS16-023", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS16-023/index.html" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2016/05/03/openssl_patches/" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 7", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20170194 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 6", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20170193 - Security Advisory" }, { "title": "Red Hat: Important: openssl security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20162073 - Security Advisory" }, { "title": "Red Hat: CVE-2016-2108", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2016-2108" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2959-1" }, { "title": "Debian Security Advisories: DSA-3566-1 openssl -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=055972eb84483959232c972f757685e0" }, { "title": "Amazon Linux AMI: ALAS-2016-695", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2016-695" }, { "title": "Citrix Security Bulletins: Citrix XenServer 7.2 Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=b7259bee9307e075caf863b54947ad7b" }, { "title": "Citrix Security Bulletins: Citrix XenServer Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=c11f24ab4065121676cfe8313127856c" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20162957 - Security Advisory" }, { "title": "Symantec Security Advisories: SA123 : OpenSSL Vulnerabilities 3-May-2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=5d65f6765e60e5fe9e6998a5bde1aadc" }, { "title": "Forcepoint Security Advisories: CVE-2016-2105, 2106, 2107, 2108, 2109, 2176 -- Security Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories\u0026qid=01fd01e3d154696ffabfde89f4142310" }, { "title": "Tenable Security Advisories: [R3] PVS 5.1.0 Fixes Multiple Third-party Library Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2016-13" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25584b3d319ca9e7cb2fae9ec5dbf5e0" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=83bbd91f8369c8f064e6d68dac68400f" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=976a4da35d55283870dbb31b88a6c655" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=2f446a7e1ea263c0c3a365776c6713f2" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=fb0fe6abcf6343f263d1cf5da183946c" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=3a04485ebb79f7fbc2472bf9af5ce489" }, { "title": "Tenable Security Advisories: [R7] LCE 4.8.1 Fixes Multiple Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2016-18" }, { "title": "Vuls simulator for Deep Security", "trust": 0.1, "url": "https://github.com/kn0630/vulssimulator_ds " }, { "title": "satellite-host-cve\nWhat does code do\nWhat versions does it work on\nPrerequisites\nHow to run your code\nExample Output\nKnown issues", "trust": 0.1, "url": "https://github.com/RedHatSatellite/satellite-host-cve " }, { "title": "OpenSSL-CVE-lib", "trust": 0.1, "url": "https://github.com/chnzzh/OpenSSL-CVE-lib " }, { "title": "https://github.com/samreleasenotes/SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/android-security-bulletin-features-two-patch-levels/119056/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-2108" }, { "db": "JVNDB", "id": "JVNDB-2016-002475" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "db": "NVD", "id": "CVE-2016-2108" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.5, "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2016-0722.html" }, { "trust": 1.4, "url": "http://source.android.com/security/bulletin/2016-07-01.html" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 1.4, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160504-openssl" }, { "trust": 1.4, "url": "http://support.citrix.com/article/ctx212736" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2016:1137" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201612-16" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2017:0194" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2017:0193" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2016-2056.html" }, { "trust": 1.1, "url": "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40202" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05164862" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2016-0996.html" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2016/jul/msg00000.html" }, { "trust": 1.1, "url": "https://support.apple.com/ht206903" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/91787" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05149345" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/89752" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-may/184605.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-may/183457.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-2959-1" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" }, { "trust": 1.1, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1035721" }, { "trust": 1.1, "url": "http://www.debian.org/security/2016/dsa-3566" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-may/183607.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" }, { "trust": 1.1, "url": "https://bto.bluecoat.com/security-advisory/sa123" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/136912/slackware-security-advisory-openssl-updates.html" }, { "trust": 1.1, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00067\u0026languageid=en-fr" }, { "trust": 1.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10759" }, { "trust": 1.1, "url": "https://www.tenable.com/security/tns-2016-18" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05386804" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbgn03726en_us" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03756en_us" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03765en_us" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "trust": 1.1, "url": "https://security.netapp.com/advisory/ntap-20160504-0001/" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2016-2957.html" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2016-2073.html" }, { "trust": 1.1, "url": "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27" }, { "trust": 1.1, "url": "https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=3661bb4e7934668bd99ca777ea8b30eedfafa871" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2108" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2108" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu94844193/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu93163809/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2108" }, { "trust": 0.8, "url": "http://www.aratana.jp/security/detail.php?id=16" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2109" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2106" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2105" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2016-2108" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2107" }, { "trust": 0.5, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2176" }, { "trust": 0.3, "url": "http://openssl.org/" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331402" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05149345" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05164862" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023779" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024078" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024319" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099464" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989046" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000158" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021361" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021376" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2016-1137.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987903" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024066" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988007" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009147" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009281" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983158" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983909" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984323" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984446" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984583" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984609" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984794" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984920" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21984977" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985736" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986068" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986152" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986473" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986506" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986563" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986564" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986669" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987671" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987779" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987968" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988055" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988071" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988189" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988976" }, { "trust": 0.3, "url": "https://gtacknowledge.extremenetworks.com/articles/vulnerability_notice/vn-2016-007-cve-2016-2108-negative-zero" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory20.asc" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982814" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1007982" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-2109" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-2106" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-2105" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4459" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-4459" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2178" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2177" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/2688611" }, { "trust": 0.2, "url": "https://access.redhat.com/solutions/222023" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-4000" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-4000" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3195" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3183" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-3110" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-3195" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-3183" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-3110" }, { "trust": 0.2, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform\u0026downloadtype=securitypatches\u0026version=6.4" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/kn0630/vulssimulator_ds" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2959-1/" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05386804" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2018" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0800" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2180" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2105" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2183" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2107" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2178" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2176" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7052" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6304" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6305" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2106" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2108" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7052" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6306" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2109" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6304" }, { "trust": 0.1, "url": "http://eprint.iacr.org/2016/594.pdf" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6305" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2180" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2177" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2183" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6306" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2107" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0799" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2842" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-0799" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2842" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2016-2054.html" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform/6.4/index.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2177" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8612" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6808" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6808" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8612" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-2178" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03765en_us" }, { "trust": 0.1, "url": "http://h20565.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-a00006123en_" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0718" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4599" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4601" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4449" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4483" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1836" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4600" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1865" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4597" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4596" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4447" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1863" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4582" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4595" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1864" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9862" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4448" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4598" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1684" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4602" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht206900" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4594" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-2108" }, { "db": "BID", "id": "89752" }, { "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "db": "PACKETSTORM", "id": "137240" }, { "db": "PACKETSTORM", "id": "141029" }, { "db": "PACKETSTORM", "id": "140056" }, { "db": "PACKETSTORM", "id": "136937" }, { "db": "PACKETSTORM", "id": "136893" }, { "db": "PACKETSTORM", "id": "139114" }, { "db": "PACKETSTORM", "id": "140716" }, { "db": "PACKETSTORM", "id": "143513" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "139116" }, { "db": "NVD", "id": "CVE-2016-2108" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2016-2108" }, { "db": "BID", "id": "89752" }, { "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "db": "PACKETSTORM", "id": "137240" }, { "db": "PACKETSTORM", "id": "141029" }, { "db": "PACKETSTORM", "id": "140056" }, { "db": "PACKETSTORM", "id": "136937" }, { "db": "PACKETSTORM", "id": "136893" }, { "db": "PACKETSTORM", "id": "139114" }, { "db": "PACKETSTORM", "id": "140716" }, { "db": "PACKETSTORM", "id": "143513" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "139116" }, { "db": "NVD", "id": "CVE-2016-2108" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-05T00:00:00", "db": "VULMON", "id": "CVE-2016-2108" }, { "date": "2016-05-03T00:00:00", "db": "BID", "id": "89752" }, { "date": "2016-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "date": "2016-05-31T13:33:18", "db": "PACKETSTORM", "id": "137240" }, { "date": "2017-02-13T16:39:00", "db": "PACKETSTORM", "id": "141029" }, { "date": "2016-12-07T16:37:31", "db": "PACKETSTORM", "id": "140056" }, { "date": "2016-05-09T14:05:44", "db": "PACKETSTORM", "id": "136937" }, { "date": "2016-05-03T22:55:47", "db": "PACKETSTORM", "id": "136893" }, { "date": "2016-10-12T20:16:45", "db": "PACKETSTORM", "id": "139114" }, { "date": "2017-01-25T21:53:15", "db": "PACKETSTORM", "id": "140716" }, { "date": "2017-07-26T17:44:00", "db": "PACKETSTORM", "id": "143513" }, { "date": "2016-07-19T19:45:20", "db": "PACKETSTORM", "id": "137958" }, { "date": "2016-10-12T23:44:55", "db": "PACKETSTORM", "id": "139116" }, { "date": "2016-05-05T01:59:04.230000", "db": "NVD", "id": "CVE-2016-2108" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2016-2108" }, { "date": "2016-10-10T00:14:00", "db": "BID", "id": "89752" }, { "date": "2017-10-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002475" }, { "date": "2024-11-21T02:47:49.563000", "db": "NVD", "id": "CVE-2016-2108" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "89752" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL of ASN.1 Implementation of arbitrary code execution vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002475" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "89752" } ], "trust": 0.3 } }
ghsa-cf8v-cq93-65gh
Vulnerability from github
The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
{ "affected": [], "aliases": [ "CVE-2016-2108" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-05T01:59:00Z", "severity": "CRITICAL" }, "details": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "id": "GHSA-cf8v-cq93-65gh", "modified": "2022-05-14T03:57:53Z", "published": "2022-05-14T03:57:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2016-18" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "type": "WEB", "url": "https://support.apple.com/HT206903" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20160504-0001" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201612-16" }, { "type": "WEB", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067\u0026languageid=en-fr" }, { "type": "WEB", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03765en_us" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03756en_us" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03726en_us" }, { "type": "WEB", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27" }, { "type": "WEB", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa123" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0194" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0193" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1137" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0722.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0996.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2073.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html" }, { "type": "WEB", "url": "http://source.android.com/security/bulletin/2016-07-01.html" }, { "type": "WEB", "url": "http://support.citrix.com/article/CTX212736" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3566" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/89752" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91787" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035721" }, { "type": "WEB", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.542103" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2959-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
icsa-22-349-21
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a denial-of-service condition or could lead to execution of arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": " Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": " Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": " Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "These vulnerabilities are exploitable remotely. These vulnerabilities have a low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-412672.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-349-21.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-349-21 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-21" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "category": "external", "summary": "SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-412672.txt" } ], "title": "Siemens SCALANCE X-200RNA Switch Devices", "tracking": { "current_release_date": "2022-12-15T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-349-21", "initial_release_date": "2022-12-15T00:00:00.000000Z", "revision_history": [ { "date": "2022-12-15T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Publication Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2MB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (HSR) (6GK5204-0BA00-2MB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2KB2" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA (PRP) (6GK5204-0BA00-2KB2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-2NA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (HSR) (6GK5204-0BS00-2NA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3LA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP) (6GK5204-0BS00-3LA3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c V3.2.7", "product": { "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)", "product_id": "CSAFPID-0005", "product_identification_helper": { "model_numbers": [ "6GK5204-0BS00-3PA3" ] } } } ], "category": "product_name", "name": "SCALANCE X204RNA EEC (PRP/HSR) (6GK5204-0BS00-3PA3)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0190", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0190" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-0190" }, { "cve": "CVE-2003-1562", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-1562" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2003-1562" }, { "cve": "CVE-2014-8176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2014-8176" }, { "cve": "CVE-2015-0207", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0207" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0207" }, { "cve": "CVE-2015-0208", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0208" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0208" }, { "cve": "CVE-2015-0209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0209" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0209" }, { "cve": "CVE-2015-0285", "cwe": { "id": "CWE-335", "name": "Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)" }, "notes": [ { "category": "summary", "text": "The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0285" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0285" }, { "cve": "CVE-2015-0286", "cwe": { "id": "CWE-1024", "name": "Comparison of Incompatible Types" }, "notes": [ { "category": "summary", "text": "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0286" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0286" }, { "cve": "CVE-2015-0287", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0287" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0287" }, { "cve": "CVE-2015-0288", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0288" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0288" }, { "cve": "CVE-2015-0289", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0289" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0289" }, { "cve": "CVE-2015-0290", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0290" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0290" }, { "cve": "CVE-2015-0291", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0291" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0291" }, { "cve": "CVE-2015-0292", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0292" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0292" }, { "cve": "CVE-2015-0293", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-0293" }, { "cve": "CVE-2015-1787", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1787" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1787" }, { "cve": "CVE-2015-1788", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1788" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1788" }, { "cve": "CVE-2015-1789", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1789" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1789" }, { "cve": "CVE-2015-1790", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1790" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1790" }, { "cve": "CVE-2015-1791", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1791" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1791" }, { "cve": "CVE-2015-1792", "cwe": { "id": "CWE-690", "name": "Unchecked Return Value to NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1792" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1792" }, { "cve": "CVE-2015-1794", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1794" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-1794" }, { "cve": "CVE-2015-3193", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3193" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-3195", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3195" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3195" }, { "cve": "CVE-2015-3196", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3196" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3196" }, { "cve": "CVE-2015-3197", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3197" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-3197" }, { "cve": "CVE-2015-4000", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-4000" }, { "cve": "CVE-2015-5352", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "notes": [ { "category": "summary", "text": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5352" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5352" }, { "cve": "CVE-2015-5600", "cwe": { "id": "CWE-799", "name": "Improper Control of Interaction Frequency" }, "notes": [ { "category": "summary", "text": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5600" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-5600" }, { "cve": "CVE-2015-6563", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6563" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6563" }, { "cve": "CVE-2015-6564", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6564" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6564" }, { "cve": "CVE-2015-6565", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6565" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-6565" }, { "cve": "CVE-2015-8325", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8325" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2015-8325" }, { "cve": "CVE-2016-0701", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0701" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0701" }, { "cve": "CVE-2016-0702", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a \"CacheBleed\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0702" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0702" }, { "cve": "CVE-2016-0703", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0703" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0703" }, { "cve": "CVE-2016-0704", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0704" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0704" }, { "cve": "CVE-2016-0705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0777", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0777" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0777" }, { "cve": "CVE-2016-0778", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0778" }, { "cve": "CVE-2016-0797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0797" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0797" }, { "cve": "CVE-2016-0798", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0798" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0798" }, { "cve": "CVE-2016-0799", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0799" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0799" }, { "cve": "CVE-2016-0800", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A cross-protocol attack was discovered that could allow an attacker to decrypt intercepted TLS sessions by using a server supporting SSLv2 as a Bleichenbacher RSA padding oracle.\nIn order to exploit the vulnerability, the attacker must have network access to the affected devices and must be in a privileged network position.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0800" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-0800" }, { "cve": "CVE-2016-1907", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1907" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1907" }, { "cve": "CVE-2016-1908", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1908" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-1908" }, { "cve": "CVE-2016-2105", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2105" }, { "cve": "CVE-2016-2106", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2106" }, { "cve": "CVE-2016-2107", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2107" }, { "cve": "CVE-2016-2108", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2108" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-2109", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2109" }, { "cve": "CVE-2016-2176", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2176" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2176" }, { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2177" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2179", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2179" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2179" }, { "cve": "CVE-2016-2180", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2180" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2180" }, { "cve": "CVE-2016-2181", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2181" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2181" }, { "cve": "CVE-2016-2182", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2182" }, { "cve": "CVE-2016-2183", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-6210", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6210" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6210" }, { "cve": "CVE-2016-6302", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6302" }, { "cve": "CVE-2016-6303", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6303" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6303" }, { "cve": "CVE-2016-6304", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6305", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6305" }, { "cve": "CVE-2016-6306", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-6307", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6307" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6307" }, { "cve": "CVE-2016-6308", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "summary", "text": "statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6308" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6308" }, { "cve": "CVE-2016-6515", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6515" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-6515" }, { "cve": "CVE-2016-8858", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-8858" }, { "cve": "CVE-2016-10009", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "summary", "text": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10009" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10009" }, { "cve": "CVE-2016-10010", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10010" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10010" }, { "cve": "CVE-2016-10011", "cwe": { "id": "CWE-244", "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" }, "notes": [ { "category": "summary", "text": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10011" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10011" }, { "cve": "CVE-2016-10012", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10012" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2016-10012" }, { "cve": "CVE-2017-3735", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3735" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-15906", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15906" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2017-15906" }, { "cve": "CVE-2018-15473", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-15473" }, { "cve": "CVE-2018-20685", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2018-20685" }, { "cve": "CVE-2019-1552", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be \u0027/usr/local\u0027. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of \u0027C:/usr/local\u0027, which may be world writable, which enables untrusted users to modify OpenSSL\u0027s default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, \u0027/usr/local/ssl\u0027 is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1552" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-1552" }, { "cve": "CVE-2019-6109", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6109" }, { "cve": "CVE-2019-6110", "cwe": { "id": "CWE-838", "name": "Inappropriate Encoding for Output Context" }, "notes": [ { "category": "summary", "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6110" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6110" }, { "cve": "CVE-2019-6111", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-6111" }, { "cve": "CVE-2019-16905", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the affected systems, especially to ports 22/tcp and 443/tcp to trusted IP addresses only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Deactivate the webserver if not required, and if deactivation is supported by the product", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "vendor_fix", "details": "Update to V3.2.7 or later version", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109814809/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ], "title": "CVE-2019-16905" } ] }
wid-sec-w-2024-0215
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in OpenSSL ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service Angriff durchf\u00fchren, beliebigen Programmcode ausf\u00fchren oder sensible Informationen aussp\u00e4hen.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- CISCO Appliance\n- F5 Networks\n- Juniper Appliance\n- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0215 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2024-0215.json" }, { "category": "self", "summary": "WID-SEC-2024-0215 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0215" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1228-1 vom 2016-05-04", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161228-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1233-1 vom 2016-05-04", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161233-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1206 vom 2016-05-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161206-1.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-3566 vom 2016-05-03", "url": "https://www.debian.org/security/2016/dsa-3566" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2959 vom 2016-05-03", "url": "http://www.ubuntu.com/usn/usn-2959-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1231-1 vom 2016-05-04", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161231-1.html" }, { "category": "external", "summary": "OpenSSL Security Advisory vom 2016-05-03", "url": "https://www.openssl.org/news/secadv/20160503.txt" }, { "category": "external", "summary": "The FreeBSD Project Security Advisory FreeBSD-SA-16:17.openssl vom 2016-05-04", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc" }, { "category": "external", "summary": "Cisco Security Advisory cisco-sa-20160504-openssl Stand 2016-05-05", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "category": "external", "summary": "Arista Security Advisory 0020 vom 2016-05-06", "url": "http://www.arista.com/en/support/advisories-notices/security-advisories/1334-security-advisory-20" }, { "category": "external", "summary": "F5 Security Advisory sol23230229 vom 2016-05-06", "url": "https://support.f5.com/kb/en-us/solutions/public/k/23/sol23230229.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1267-1 vom 2016-05-09", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161267-1.html" }, { "category": "external", "summary": "BLUECOAT Security Advisory SA12 vom 2016-05-10", "url": "https://bto.bluecoat.com/security-advisory/sa123" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0996-2 vom 2016-05-10", "url": "https://rhn.redhat.com/errata/RHSA-2016-0996.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0722-1 vom 2016-05-09", "url": "https://rhn.redhat.com/errata/RHSA-2016-0722.html" }, { "category": "external", "summary": "SUSE Security Update Announcement ID SUSE-SU-2016:1290-1 vom 2016-05-12", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1360-1 vom 2016-05-19", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161360-1.html" }, { "category": "external", "summary": "F5 Security Advisory sol36488941 vom 2016-05-19", "url": "https://support.f5.com/kb/en-us/solutions/public/k/36/sol36488941.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:1137-1 vom 2016-05-31", "url": "http://rhn.redhat.com/errata/RHSA-2016-1137.html" }, { "category": "external", "summary": "Splunk Advisory SPL-119440 vom 2016-06-07", "url": "http://www.splunk.com/view/SP-CAAAPPQ" }, { "category": "external", "summary": "Splunk Advisory SP-CAAAPP4 vom 2016-07-14", "url": "http://www.splunk.com/view/SP-CAAAPP4" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:1650-1 vom 2016-08-22", "url": "https://rhn.redhat.com/errata/RHSA-2016-1650.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:1649-1 vom 2016-08-22 vom 2016-08-22", "url": "https://rhn.redhat.com/errata/RHSA-2016-1649.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:16489-1 vom 2016-08-22 vom 2016-08-22", "url": "https://rhn.redhat.com/errata/RHSA-2016-1648.html" }, { "category": "external", "summary": "Juniper Security Bulletin JSA10759 vom 2016-10-14", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759\u0026cat=SIRT_1\u0026actp=LIST" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:2073 vom 2016-10-18", "url": "https://access.redhat.com/errata/RHSA-2016:2073" }, { "category": "external", "summary": "F5 Security Advisory SOL51920288 vom 2016-11-14", "url": "https://support.f5.com/kb/en-us/solutions/public/k/51/sol51920288.html" }, { "category": "external", "summary": "F5 Security Advisory SOL13123 vom 2016-11-18", "url": "https://support.f5.com/kb/en-us/solutions/public/k/93/sol93600123.html" }, { "category": "external", "summary": "F5 Security Advisory SOL16871115 vom 2016-12-02", "url": "https://support.f5.com/kb/en-us/solutions/public/k/16/sol16871115.html" }, { "category": "external", "summary": "F5 Security Advisory SOL37345003 vom 2016-12-02", "url": "https://support.f5.com/kb/en-us/solutions/public/k/37/sol37345003.html" }, { "category": "external", "summary": "F5 Security Advisory SOL08654415 vom 2016-12-02", "url": "https://support.f5.com/kb/en-us/solutions/public/k/08/sol08654415.html" }, { "category": "external", "summary": "F5 Security Advisory SOL04347850 vom 2016-12-02", "url": "https://support.f5.com/kb/en-us/solutions/public/k/04/sol04347850.html" }, { "category": "external", "summary": "F5 Security Advisory SOL93600123 vom 2016-05-06", "url": "http://support.f5.com/kb/en-us/solutions/public/k/93/sol93600123.html?ref=rss" }, { "category": "external", "summary": "Sophos UTM Release Notes vom 2016-12-08", "url": "https://community.sophos.com/products/unified-threat-management/b/utm-blog/posts/utm-up2date-9-321-released" }, { "category": "external", "summary": "Sophos UTM Release Notes Stand 2016-12-08", "url": "https://community.sophos.com/products/unified-threat-management/b/utm-blog/posts/utm-up2date-9-358-released" }, { "category": "external", "summary": "EMC Knowledge Base Article: 000493630", "url": "https://support.emc.com/kb/493630" }, { "category": "external", "summary": "Juniper Security Advisory JSA10774 vom 2017-01-12", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "category": "external", "summary": "Juniper Security Advisory JSA10770 vom 2017-01-12", "url": "http://www.auscert.org.au/render.html?it=42842" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0461-1 vom 2017-02-15", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170461-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0495-1 vom 2017-02-17", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170495-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0585-1 vom 2017-03-02", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170585-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0605-1 vom 2017-03-03", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170605-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0601-1 vom 2017-03-04", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170601-1.html" }, { "category": "external", "summary": "NetApp Advisory Number NTAP-20160504-0001 vom 2017-04-06", "url": "https://kb.netapp.com/support/s/article/ka51A00000007QKQAY/may-2016-openssl-vulnerabilities-in-multiple-netapp-products?language=en_US" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20160504-0001 vom 2017-11-07", "url": "https://security.netapp.com/advisory/ntap-20160504-0001/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0112-1 vom 2018-01-16", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180112-1.html" }, { "category": "external", "summary": "Citrix Security Bulletin CTX233832", "url": "https://support.citrix.com/article/CTX233832" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4581 vom 2019-03-13", "url": "http://linux.oracle.com/errata/ELSA-2019-4581.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4747 vom 2019-08-16", "url": "http://linux.oracle.com/errata/ELSA-2019-4747.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9150 vom 2021-04-01", "url": "https://linux.oracle.com/errata/ELSA-2021-9150.html" }, { "category": "external", "summary": "Huawei Security Advisory HUAWEI-SA-20160706-01-OPENSSL vom 2021-12-22", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160706-01-openssl-en" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9272 vom 2022-04-08", "url": "https://linux.oracle.com/errata/ELSA-2022-9272.html" }, { "category": "external", "summary": "Dell Knowledge Base Article", "url": "https://www.dell.com/support/kbdoc/en-us/000221474/dsa-2024-059-security-update-for-dell-networker-multiple-components-vulnerabilities" } ], "source_lang": "en-US", "title": "OpenSSL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-28T22:00:00.000+00:00", "generator": { "date": "2024-08-29T11:38:31.029+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2024-0215", "initial_release_date": "2016-05-03T22:00:00.000+00:00", "revision_history": [ { "date": "2016-05-03T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-05-03T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "6", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "8", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "9", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "10", "summary": "Version nicht vorhanden" }, { "date": "2016-05-04T22:00:00.000+00:00", "number": "11", "summary": "Version nicht vorhanden" }, { "date": "2016-05-08T22:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2016-05-08T22:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2016-05-08T22:00:00.000+00:00", "number": "14", "summary": "Version nicht vorhanden" }, { "date": "2016-05-08T22:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2016-05-08T22:00:00.000+00:00", "number": "16", "summary": "Version nicht vorhanden" }, { "date": "2016-05-09T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2016-05-09T22:00:00.000+00:00", "number": "18", "summary": "Version nicht vorhanden" }, { "date": "2016-05-09T22:00:00.000+00:00", "number": "19", "summary": "New remediations available" }, { "date": "2016-05-09T22:00:00.000+00:00", "number": "20", "summary": "Version nicht vorhanden" }, { "date": "2016-05-09T22:00:00.000+00:00", "number": "21", "summary": "New remediations available" }, { "date": "2016-05-09T22:00:00.000+00:00", "number": "22", "summary": "Version nicht vorhanden" }, { "date": "2016-05-12T22:00:00.000+00:00", "number": "23", "summary": "New remediations available" }, { "date": "2016-05-12T22:00:00.000+00:00", "number": "24", "summary": "Version nicht vorhanden" }, { "date": "2016-05-19T22:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2016-05-19T22:00:00.000+00:00", "number": "26", "summary": "Version nicht vorhanden" }, { "date": "2016-05-19T22:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2016-05-30T22:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2016-05-30T22:00:00.000+00:00", "number": "29", "summary": "Version nicht vorhanden" }, { "date": "2016-06-20T22:00:00.000+00:00", "number": "30", "summary": "New remediations available" }, { "date": "2016-06-20T22:00:00.000+00:00", "number": "31", "summary": "Version nicht vorhanden" }, { "date": "2016-07-14T22:00:00.000+00:00", "number": "32", "summary": "New remediations available" }, { "date": "2016-07-14T22:00:00.000+00:00", "number": "33", "summary": "Version nicht vorhanden" }, { "date": "2016-08-22T22:00:00.000+00:00", "number": "34", "summary": "New remediations available" }, { "date": "2016-08-22T22:00:00.000+00:00", "number": "35", "summary": "Version nicht vorhanden" }, { "date": "2016-08-22T22:00:00.000+00:00", "number": "36", "summary": "Version nicht vorhanden" }, { "date": "2016-10-16T22:00:00.000+00:00", "number": "37", "summary": "New remediations available" }, { "date": "2016-10-16T22:00:00.000+00:00", "number": "38", "summary": "Version nicht vorhanden" }, { "date": "2016-10-16T22:00:00.000+00:00", "number": "39", "summary": "Version nicht vorhanden" }, { "date": "2016-10-16T22:00:00.000+00:00", "number": "40", "summary": "Version nicht vorhanden" }, { "date": "2016-10-18T22:00:00.000+00:00", "number": "41", "summary": "New remediations available" }, { "date": "2016-11-14T23:00:00.000+00:00", "number": "42", "summary": "New remediations available" }, { "date": "2016-11-20T23:00:00.000+00:00", "number": "43", "summary": "New remediations available" }, { "date": "2016-12-01T23:00:00.000+00:00", "number": "44", "summary": "New remediations available" }, { "date": "2016-12-05T23:00:00.000+00:00", "number": "45", "summary": "New remediations available" }, { "date": "2016-12-08T23:00:00.000+00:00", "number": "46", "summary": "New remediations available" }, { "date": "2016-12-08T23:00:00.000+00:00", "number": "47", "summary": "Version nicht vorhanden" }, { "date": "2016-12-08T23:00:00.000+00:00", "number": "48", "summary": "New remediations available" }, { "date": "2016-12-20T23:00:00.000+00:00", "number": "49", "summary": "New remediations available" }, { "date": "2016-12-20T23:00:00.000+00:00", "number": "50", "summary": "Version nicht vorhanden" }, { "date": "2016-12-20T23:00:00.000+00:00", "number": "51", "summary": "Version nicht vorhanden" }, { "date": "2016-12-20T23:00:00.000+00:00", "number": "52", "summary": "Version nicht vorhanden" }, { "date": "2016-12-20T23:00:00.000+00:00", "number": "53", "summary": "Version nicht vorhanden" }, { "date": "2016-12-20T23:00:00.000+00:00", "number": "54", "summary": "Version nicht vorhanden" }, { "date": "2016-12-20T23:00:00.000+00:00", "number": "55", "summary": "Version nicht vorhanden" }, { "date": "2017-01-11T23:00:00.000+00:00", "number": "56", "summary": "New remediations available" }, { "date": "2017-02-15T23:00:00.000+00:00", "number": "57", "summary": "New remediations available" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "58", "summary": "New remediations available" }, { "date": "2017-03-02T23:00:00.000+00:00", "number": "59", "summary": "New remediations available" }, { "date": "2017-03-05T23:00:00.000+00:00", "number": "60", "summary": "New remediations available" }, { "date": "2017-03-05T23:00:00.000+00:00", "number": "61", "summary": "New remediations available" }, { "date": "2017-08-27T22:00:00.000+00:00", "number": "62", "summary": "reference added" }, { "date": "2017-08-27T22:00:00.000+00:00", "number": "63", "summary": "Version nicht vorhanden" }, { "date": "2017-11-06T23:00:00.000+00:00", "number": "64", "summary": "New remediations available" }, { "date": "2018-01-16T23:00:00.000+00:00", "number": "65", "summary": "New remediations available" }, { "date": "2018-04-02T22:00:00.000+00:00", "number": "66", "summary": "New remediations available" }, { "date": "2018-04-02T22:00:00.000+00:00", "number": "67", "summary": "Version nicht vorhanden" }, { "date": "2019-03-13T23:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-18T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-31T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-12-22T23:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Huawei aufgenommen" }, { "date": "2022-04-10T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-08-28T22:00:00.000+00:00", "number": "74", "summary": "CPE Zuordnungen korrigiert" } ], "status": "final", "version": "74" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=4.15", "product": { "name": "Arista EOS \u003c=4.15", "product_id": "T006486" } }, { "category": "product_version_range", "name": "\u003c=4.15", "product": { "name": "Arista EOS \u003c=4.15", "product_id": "T006486-fixed" } } ], "category": "product_name", "name": "EOS" } ], "category": "vendor", "name": "Arista" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6.1", "product": { "name": "Blue Coat Director 6.1", "product_id": "T006616", "product_identification_helper": { "cpe": "cpe:/a:bluecoat:director:6.1" } } } ], "category": "product_name", "name": "Director" }, { "branches": [ { "category": "product_version", "name": "3.5", "product": { "name": "Blue Coat ProxyAV 3.5", "product_id": "T003290", "product_identification_helper": { "cpe": "cpe:/h:bluecoat:proxyav:3.5" } } } ], "category": "product_name", "name": "ProxyAV" }, { "branches": [ { "category": "product_version", "name": "6.6", "product": { "name": "Blue Coat ProxySG 6.6", "product_id": "T006617", "product_identification_helper": { "cpe": "cpe:/h:bluecoat:proxysg:6.6" } } }, { "category": "product_version", "name": "6.5", "product": { "name": "Blue Coat ProxySG 6.5", "product_id": "T006618", "product_identification_helper": { "cpe": "cpe:/h:bluecoat:proxysg:6.5" } } } ], "category": "product_name", "name": "ProxySG" } ], "category": "vendor", "name": "Blue Coat" }, { "branches": [ { "category": "product_name", "name": "Cisco Digital Media Manager", "product": { "name": "Cisco Digital Media Manager", "product_id": "201470", "product_identification_helper": { "cpe": "cpe:/a:cisco:digital_media_manager:-" } } }, { "category": "product_name", "name": "Cisco Digital Media Player", "product": { "name": "Cisco Digital Media Player", "product_id": "T003265", "product_identification_helper": { "cpe": "cpe:/a:cisco:digital_media_player:-" } } }, { "category": "product_name", "name": "Cisco Emergency Responder", "product": { "name": "Cisco Emergency Responder", "product_id": "2040", "product_identification_helper": { "cpe": "cpe:/a:cisco:emergency_responder:-" } } }, { "category": "product_name", "name": "Cisco IronPort Encryption Appliance", "product": { "name": "Cisco IronPort Encryption Appliance", "product_id": "T003255", "product_identification_helper": { "cpe": "cpe:/a:cisco:ironport_encryption_appliance:-" } } }, { "category": "product_name", "name": "Cisco MDS 9000", "product": { "name": "Cisco MDS 9000", "product_id": "T001069", "product_identification_helper": { "cpe": "cpe:/o:cisco:mds_9000:-" } } }, { "category": "product_name", "name": "Cisco Media Experience Engine (MXE)", "product": { "name": "Cisco Media Experience Engine (MXE)", "product_id": "T003261", "product_identification_helper": { "cpe": "cpe:/a:cisco:media_experience_engine:-" } } }, { "category": "product_name", "name": "Cisco Network Analysis Module", "product": { "name": "Cisco Network Analysis Module", "product_id": "2084", "product_identification_helper": { "cpe": "cpe:/h:cisco:network_analysis_module:-" } } }, { "category": "product_name", "name": "Cisco Nexus 1000V", "product": { "name": "Cisco Nexus 1000V", "product_id": "T003262", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus_1000v:-" } } }, { "category": "product_name", "name": "Cisco Packet Tracer", "product": { "name": "Cisco Packet Tracer", "product_id": "T005209", "product_identification_helper": { "cpe": "cpe:/a:cisco:packet_tracer:-" } } }, { "category": "product_name", "name": "Cisco Prime Infrastructure", "product": { "name": "Cisco Prime Infrastructure", "product_id": "T000756", "product_identification_helper": { "cpe": "cpe:/a:cisco:prime_infrastructure:-" } } }, { "category": "product_name", "name": "Cisco Prime Security Manager (PRSM)", "product": { "name": "Cisco Prime Security Manager (PRSM)", "product_id": "T002774", "product_identification_helper": { "cpe": "cpe:/a:cisco:prime_security_manager:-" } } }, { "category": "product_name", "name": "Cisco TelePresence Server", "product": { "name": "Cisco TelePresence Server", "product_id": "T001271", "product_identification_helper": { "cpe": "cpe:/a:cisco:telepresence_server:-" } } }, { "category": "product_name", "name": "Cisco Unified Communications Manager (CUCM)", "product": { "name": "Cisco Unified Communications Manager (CUCM)", "product_id": "2142", "product_identification_helper": { "cpe": "cpe:/a:cisco:unified_communications_manager:-" } } }, { "category": "product_name", "name": "Cisco Unified IP Phone", "product": { "name": "Cisco Unified IP Phone", "product_id": "T003264", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_ip_phones:-" } } }, { "category": "product_name", "name": "Cisco WebEx Meetings Server", "product": { "name": "Cisco WebEx Meetings Server", "product_id": "T001160", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex_meetings_server:-" } } } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.2", "product": { "name": "Citrix Systems XenServer 7.2", "product_id": "T010154", "product_identification_helper": { "cpe": "cpe:/a:citrix:xenserver:7.2" } } } ], "category": "product_name", "name": "XenServer" } ], "category": "vendor", "name": "Citrix Systems" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.10", "product": { "name": "Dell NetWorker \u003c19.10", "product_id": "T032354" } }, { "category": "product_version", "name": "19.1", "product": { "name": "Dell NetWorker 19.10", "product_id": "T032354-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1600", "product": { "name": "EMC VNXe 1600", "product_id": "T009106", "product_identification_helper": { "cpe": "cpe:/h:emc:vnx:1600" } } } ], "category": "product_name", "name": "VNXe3200" } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.2.1-11.6.0", "product": { "name": "F5 BIG-IP Analytics 11.2.1-11.6.0", "product_id": "317319", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_analytics:11.6.0" } } }, { "category": "product_version", "name": "12.0.0", "product": { "name": "F5 BIG-IP Analytics 12.0.0", "product_id": "318563", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_analytics:12.0.0" } } } ], "category": "product_name", "name": "BIG-IP Analytics" }, { "branches": [ { "category": "product_version", "name": "11.2.1-11.6.0", "product": { "name": "F5 BIG-IP Application Security Manager 11.2.1-11.6.0", "product_id": "317301", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_application_security_manager:11.6.0" } } }, { "category": "product_version", "name": "12.0.0", "product": { "name": "F5 BIG-IP Application Security Manager 12.0.0", "product_id": "318544", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_application_security_manager:12.0.0" } } }, { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 BIG-IP Application Security Manager 10.2.1-10.2.4", "product_id": "329021", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_application_security_manager:10.2.4" } } } ], "category": "product_name", "name": "BIG-IP Application Security Manager" }, { "branches": [ { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 BIG-IP Edge Gateway 10.2.1-10.2.4", "product_id": "241405", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_edge_gateway:10.2.4" } } } ], "category": "product_name", "name": "BIG-IP Edge Gateway" }, { "branches": [ { "category": "product_version", "name": "11.2.1-11.6.0", "product": { "name": "F5 BIG-IP Global Traffic Manager 11.2.1-11.6.0", "product_id": "317327", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_global_traffic_manager:11.6.0" } } }, { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 BIG-IP Global Traffic Manager 10.2.1-10.2.4", "product_id": "329023", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_global_traffic_manager:10.2.4" } } }, { "category": "product_version", "name": "12.0.0", "product": { "name": "F5 BIG-IP Global Traffic Manager 12.0.0", "product_id": "T007539", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_global_traffic_manager:12.0.0" } } } ], "category": "product_name", "name": "BIG-IP Global Traffic Manager" }, { "branches": [ { "category": "product_version", "name": "11.2.1-11.6.0", "product": { "name": "F5 BIG-IP Link Controller 11.2.1-11.6.0", "product_id": "317308", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_link_controller:11.6.0" } } }, { "category": "product_version", "name": "12.0.0", "product": { "name": "F5 BIG-IP Link Controller 12.0.0", "product_id": "318586", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_link_controller:12.0.0" } } }, { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 BIG-IP Link Controller 10.2.1-10.2.4", "product_id": "328977", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_link_controller:10.2.4" } } } ], "category": "product_name", "name": "BIG-IP Link Controller" }, { "branches": [ { "category": "product_version", "name": "11.2.1-11.6.0", "product": { "name": "F5 BIG-IP Local Traffic Manager 11.2.1-11.6.0", "product_id": "317310", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_local_traffic_manager:11.6.0" } } }, { "category": "product_version", "name": "12.0.0", "product": { "name": "F5 BIG-IP Local Traffic Manager 12.0.0", "product_id": "318541", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_local_traffic_manager:12.0.0" } } }, { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 BIG-IP Local Traffic Manager 10.2.1-10.2.4", "product_id": "328984", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_local_traffic_manager:10.2.4" } } } ], "category": "product_name", "name": "BIG-IP Local Traffic Manager" }, { "branches": [ { "category": "product_version", "name": "11.4.0-11.4.1", "product": { "name": "F5 BIG-IP Protocol Security Manager 11.4.0-11.4.1", "product_id": "T003110", "product_identification_helper": { "cpe": "cpe:/a:f5:protocol_security_manager:11.4.1" } } }, { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 BIG-IP Protocol Security Manager 10.2.1-10.2.4", "product_id": "T003111", "product_identification_helper": { "cpe": "cpe:/a:f5:protocol_security_manager:10.2.4" } } } ], "category": "product_name", "name": "BIG-IP Protocol Security Manager" }, { "branches": [ { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 WAN Optimization Manager 10.2.1-10.2.4", "product_id": "329016", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip_wan_optimization_manager:10.2.4" } } } ], "category": "product_name", "name": "WAN Optimization Manager" }, { "branches": [ { "category": "product_version", "name": "10.2.1-10.2.4", "product": { "name": "F5 WebAccelerator 10.2.1-10.2.4", "product_id": "T001411", "product_identification_helper": { "cpe": "cpe:/h:f5:big-ip_webaccelerator:10.2.4" } } } ], "category": "product_name", "name": "WebAccelerator" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "5930", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } }, { "category": "product_name", "name": "Juniper Junos Space", "product": { "name": "Juniper Junos Space", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } }, { "category": "product_name", "name": "Juniper ScreenOS", "product": { "name": "Juniper ScreenOS", "product_id": "T008638", "product_identification_helper": { "cpe": "cpe:/o:juniper:screenos:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp OnCommand Unified Manager", "product": { "name": "NetApp OnCommand Unified Manager", "product_id": "T009408", "product_identification_helper": { "cpe": "cpe:/a:netapp:oncommand_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c1.0.1t", "product": { "name": "Open Source OpenSSL \u003c1.0.1t", "product_id": "T007519" } }, { "category": "product_version", "name": "1.0.1t", "product": { "name": "Open Source OpenSSL 1.0.1t", "product_id": "T007519-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.0.1t" } } }, { "category": "product_version_range", "name": "\u003c1.0.2h", "product": { "name": "Open Source OpenSSL \u003c1.0.2h", "product_id": "T007520" } }, { "category": "product_version", "name": "1.0.2h", "product": { "name": "Open Source OpenSSL 1.0.2h", "product_id": "T007520-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.0.2h" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "5", "product": { "name": "Red Hat Enterprise Linux Server 5", "product_id": "74289", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux Server 6", "product_id": "T000343", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux Server 7", "product_id": "T003550", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_version", "name": "7.2", "product": { "name": "Red Hat Enterprise Linux Server AUS 7.2", "product_id": "T007127", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:v.7.2:aus" } } }, { "category": "product_version", "name": "7.2", "product": { "name": "Red Hat Enterprise Linux Server EUS 7.2", "product_id": "T007218", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.2:eus" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "5", "product": { "name": "Red Hat Enterprise Linux Desktop 5", "product_id": "T000180", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_desktop:5" } } }, { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux Desktop 6", "product_id": "T000222", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_desktop:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux Desktop 7", "product_id": "T003548", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_desktop:7" } } } ], "category": "product_name", "name": "Enterprise Linux Desktop" }, { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux HPC Node 6", "product_id": "T000395", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_hpc_node:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux HPC Node 7", "product_id": "T003549", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_hpc_node:7" } } }, { "category": "product_version", "name": "7.2 EUS", "product": { "name": "Red Hat Enterprise Linux HPC Node 7.2 EUS", "product_id": "T007069", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_hpc_node:7.2:eus" } } } ], "category": "product_name", "name": "Enterprise Linux HPC Node" }, { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux Workstation 6", "product_id": "T000396", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_workstation:6" } } }, { "category": "product_version", "name": "5", "product": { "name": "Red Hat Enterprise Linux Workstation 5", "product_id": "T000622", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_workstation:5" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux Workstation 7", "product_id": "T003565", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_workstation:7" } } } ], "category": "product_name", "name": "Enterprise Linux Workstation" }, { "category": "product_name", "name": "Red Hat JBoss Web Server", "product": { "name": "Red Hat JBoss Web Server", "product_id": "T003426", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "332016", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12" } } }, { "category": "product_version", "name": "12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "T006804", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12:sp1" } } } ], "category": "product_name", "name": "Linux Enterprise Desktop" }, { "branches": [ { "category": "product_version", "name": "10 SP4 LTSS", "product": { "name": "SUSE Linux Enterprise Server 10 SP4 LTSS", "product_id": "T002668", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:10:sp4:ltss" } } }, { "category": "product_version", "name": "11", "product": { "name": "SUSE Linux Enterprise Server 11", "product_id": "T005157", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11" } } }, { "category": "product_version", "name": "11 SP2 LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2 LTSS", "product_id": "T005896", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11-sp2-ltss" } } }, { "category": "product_version", "name": "11 SP3 LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3 LTSS", "product_id": "T007158", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11:sp3:ltss" } } }, { "category": "product_version", "name": "11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "T007322", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11:sp4" } } } ], "category": "product_name", "name": "Linux Enterprise Server" } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Sophos Unified Threat Management (UTM) Software", "product": { "name": "Sophos Unified Threat Management (UTM) Software", "product_id": "T006910", "product_identification_helper": { "cpe": "cpe:/a:sophos:unified_threat_management_software:-" } } } ], "category": "vendor", "name": "Sophos" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6.2.10", "product": { "name": "Splunk Splunk Enterprise 6.2.10", "product_id": "T007880", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:6.2.10" } } }, { "category": "product_version", "name": "6.0.12", "product": { "name": "Splunk Splunk Enterprise 6.0.12", "product_id": "T008032", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:6.0.12" } } }, { "category": "product_version", "name": "6.4.2", "product": { "name": "Splunk Splunk Enterprise 6.4.2", "product_id": "T008033", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:6.4.2" } } }, { "category": "product_version", "name": "6.1.11", "product": { "name": "Splunk Splunk Enterprise 6.1.11", "product_id": "T008034", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:6.1.11" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12.04 LTS", "product": { "name": "Ubuntu Linux 12.04 LTS", "product_id": "307702", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~" } } }, { "category": "product_version", "name": "14.04 LTS", "product": { "name": "Ubuntu Linux 14.04 LTS", "product_id": "308878", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~" } } }, { "category": "product_version", "name": "16.04 LTS", "product": { "name": "Ubuntu Linux 16.04 LTS", "product_id": "T007521", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:16.04_lts" } } }, { "category": "product_version", "name": "15.1", "product": { "name": "Ubuntu Linux 15.10", "product_id": "T007522", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:15.10" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2105", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL in den Funktionen \"EVP_EncodeUpdate\" und \"EVP_EncryptUpdate()\". Die Schwachstelle beruht darauf, dass die Eingabedaten in den Funktionen nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft werden. Ein entfernter, anonymer Angreifer kann dadurch einen \u00dcberlauf verursachen und somit einen Denial of Service Angriff durchf\u00fchren oder m\u00f6glicherweise beliebigen Programmcode ausf\u00fchren." } ], "product_status": { "known_affected": [ "T001160", "T003264", "T003265", "T007069", "T003343", "T009408", "T008638", "T002774", "T006616", "T010154", "T003426", "T003548", "317310", "T006618", "T003549", "T005209", "T006617", "318563", "T004914", "317308", "T000756", "329023", "329021", "5930", "T008032", "T000396", "T000395", "T003261", "T008033", "T003262", "T008034", "T001271", "T000180", "T003255", "T005157", "T007218", "74289", "T007539", "T006804", "317327", "2040", "2084", "T032354", "332016", "317319", "2951", "T002207", "T000622", "T000222", "T000343", "329016", "T003290", "T007522", "T007127", "T009106", "T007322", "T007520", "T007521", "T003565", "4035", "T006910", "318544", "318586", "318541", "T001069", "T007880", "T003110", "T003550", "T003111", "328977", "T007158", "T005896", "317301", "T007519", "2142", "T002668", "241405", "201470", "T001411", "307702", "308878", "328984" ], "last_affected": [ "T006486" ] }, "release_date": "2016-05-03T22:00:00.000+00:00", "title": "CVE-2016-2105" }, { "cve": "CVE-2016-2106", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL in den Funktionen \"EVP_EncodeUpdate\" und \"EVP_EncryptUpdate()\". Die Schwachstelle beruht darauf, dass die Eingabedaten in den Funktionen nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft werden. Ein entfernter, anonymer Angreifer kann dadurch einen \u00dcberlauf verursachen und somit einen Denial of Service Angriff durchf\u00fchren oder m\u00f6glicherweise beliebigen Programmcode ausf\u00fchren." } ], "product_status": { "known_affected": [ "T001160", "T003264", "T003265", "T007069", "T003343", "T009408", "T008638", "T002774", "T006616", "T010154", "T003426", "T003548", "317310", "T006618", "T003549", "T005209", "T006617", "318563", "T004914", "317308", "T000756", "329023", "329021", "5930", "T008032", "T000396", "T000395", "T003261", "T008033", "T003262", "T008034", "T001271", "T000180", "T003255", "T005157", "T007218", "74289", "T007539", "T006804", "317327", "2040", "2084", "T032354", "332016", "317319", "2951", "T002207", "T000622", "T000222", "T000343", "329016", "T003290", "T007522", "T007127", "T009106", "T007322", "T007520", "T007521", "T003565", "4035", "T006910", "318544", "318586", "318541", "T001069", "T007880", "T003110", "T003550", "T003111", "328977", "T007158", "T005896", "317301", "T007519", "2142", "T002668", "241405", "201470", "T001411", "307702", "308878", "328984" ], "last_affected": [ "T006486" ] }, "release_date": "2016-05-03T22:00:00.000+00:00", "title": "CVE-2016-2106" }, { "cve": "CVE-2016-2107", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL. Diese Schwachstelle beruht auf eine fehlerhafte Implementierung der \"Padding\" \u00dcberpr\u00fcfung. Ein Man-in-the-Middle (MitM) kann diese Schwachstelle f\u00fcr einen \"Padding Oracle\"-Angriff ausnutzen, um den Netzwerkverkehr zu entschl\u00fcsseln, wenn die Verbindung AES-CBC-Chiffren verwendet und der Server den Befehlssatz AES unterst\u00fctzt. Ein entfernter, anonymer Angreifer kann dadurch Sicherheitsvorkehrungen umgehen." } ], "product_status": { "known_affected": [ "T001160", "T003264", "T003265", "T007069", "T009408", "T008638", "T002774", "T006616", "T010154", "T003426", "T003548", "317310", "T006618", "T003549", "T005209", "T006617", "318563", "T004914", "317308", "T000756", "329023", "329021", "T008032", "T000396", "T000395", "T003261", "T008033", "T003262", "T008034", "T001271", "T000180", "T003255", "T005157", "T007218", "74289", "T007539", "T006804", "317327", "2040", "2084", "T032354", "332016", "317319", "2951", "T002207", "T000622", "T000222", "T000343", "329016", "T003290", "T007522", "T007127", "T009106", "T007322", "T007520", "T007521", "T003565", "4035", "T006910", "318544", "318586", "318541", "T001069", "T007880", "T003110", "T003550", "T003111", "328977", "T007158", "T005896", "317301", "T007519", "2142", "T002668", "241405", "201470", "T001411", "307702", "308878", "328984" ], "last_affected": [ "T006486" ] }, "release_date": "2016-05-03T22:00:00.000+00:00", "title": "CVE-2016-2107" }, { "cve": "CVE-2016-2108", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in OpenSSL im Zusammenhang mit ASN.1 (Abstract Syntax Notation One). Diese Schwachstellen beruhen darauf, dass die ASN.1-Daten nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft und verarbeitet werden. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Angriff durchzuf\u00fchren, beliebigen Programmcode auf dem System auszuf\u00fchren oder sensible Informationen auszusp\u00e4hen." } ], "product_status": { "known_affected": [ "T001160", "T003264", "T003265", "T007069", "T003343", "T009408", "T008638", "T002774", "T006616", "T010154", "T003426", "T003548", "317310", "T006618", "T003549", "T005209", "T006617", "318563", "T004914", "317308", "T000756", "329023", "329021", "T008032", "T000396", "T000395", "T003261", "T008033", "T003262", "T008034", "T001271", "T000180", "T003255", "T005157", "T007218", "74289", "T007539", "T006804", "317327", "2040", "2084", "T032354", "332016", "317319", "2951", "T002207", "T000622", "T000222", "T000343", "329016", "T003290", "T007522", "T007127", "T009106", "T007322", "T007520", "T007521", "T003565", "4035", "T006910", "318544", "318586", "318541", "T001069", "T007880", "T003110", "T003550", "T003111", "328977", "T007158", "T005896", "317301", "T007519", "2142", "T002668", "241405", "201470", "T001411", "307702", "308878", "328984" ], "last_affected": [ "T006486" ] }, "release_date": "2016-05-03T22:00:00.000+00:00", "title": "CVE-2016-2108" }, { "cve": "CVE-2016-2109", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in OpenSSL im Zusammenhang mit ASN.1 (Abstract Syntax Notation One). Diese Schwachstellen beruhen darauf, dass die ASN.1-Daten nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft und verarbeitet werden. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Angriff durchzuf\u00fchren, beliebigen Programmcode auf dem System auszuf\u00fchren oder sensible Informationen auszusp\u00e4hen." } ], "product_status": { "known_affected": [ "T001160", "T003264", "T003265", "T007069", "T003343", "T009408", "T008638", "T002774", "T006616", "T010154", "T003426", "T003548", "317310", "T006618", "T003549", "T005209", "T006617", "318563", "T004914", "317308", "T000756", "329023", "329021", "T008032", "T000396", "T000395", "T003261", "T008033", "T003262", "T008034", "T001271", "T000180", "T003255", "T005157", "T007218", "74289", "T007539", "T006804", "317327", "2040", "2084", "T032354", "332016", "317319", "2951", "T002207", "T000622", "T000222", "T000343", "329016", "T003290", "T007522", "T007127", "T009106", "T007322", "T007520", "T007521", "T003565", "4035", "T006910", "318544", "318586", "318541", "T001069", "T007880", "T003110", "T003550", "T003111", "328977", "T007158", "T005896", "317301", "T007519", "2142", "T002668", "241405", "201470", "T001411", "307702", "308878", "328984" ], "last_affected": [ "T006486" ] }, "release_date": "2016-05-03T22:00:00.000+00:00", "title": "CVE-2016-2109" }, { "cve": "CVE-2016-2176", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in OpenSSL im Zusammenhang mit ASN.1 (Abstract Syntax Notation One). Diese Schwachstellen beruhen darauf, dass die ASN.1-Daten nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft und verarbeitet werden. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Angriff durchzuf\u00fchren, beliebigen Programmcode auf dem System auszuf\u00fchren oder sensible Informationen auszusp\u00e4hen." } ], "product_status": { "known_affected": [ "T001160", "T003264", "T003265", "T007069", "T003343", "T009408", "T008638", "T002774", "T006616", "T010154", "T003426", "T003548", "317310", "T006618", "T003549", "T005209", "T006617", "318563", "T004914", "317308", "T000756", "329023", "329021", "T008032", "T000396", "T000395", "T003261", "T008033", "T003262", "T008034", "T001271", "T000180", "T003255", "T005157", "T007218", "74289", "T007539", "T006804", "317327", "2040", "2084", "T032354", "332016", "317319", "2951", "T002207", "T000622", "T000222", "T000343", "329016", "T003290", "T007522", "T007127", "T009106", "T007322", "T007520", "T007521", "T003565", "4035", "T006910", "318544", "318586", "318541", "T001069", "T007880", "T003110", "T003550", "T003111", "328977", "T007158", "T005896", "317301", "T007519", "2142", "T002668", "241405", "201470", "T001411", "307702", "308878", "328984" ], "last_affected": [ "T006486" ] }, "release_date": "2016-05-03T22:00:00.000+00:00", "title": "CVE-2016-2176" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.