Action not permitted
Modal body text goes here.
cve-2005-2969
Vulnerability from cvelistv5
Published
2005-10-18 04:00
Modified
2024-08-07 22:53
Severity ?
EPSS score ?
Summary
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:53:29.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17259" }, { "name": "23915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23915" }, { "name": "SUSE-SA:2005:061", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html" }, { "name": "26893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26893" }, { "name": "17389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17389" }, { "name": "ADV-2005-3056", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/3056" }, { "name": "ADV-2007-2457", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2457" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm" }, { "name": "17813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17813" }, { "name": "15071", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15071" }, { "name": "18165", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18165" }, { "name": "23340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23340" }, { "name": "18123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18123" }, { "name": "DSA-881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-881" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html" }, { "name": "ADV-2005-2659", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2659" }, { "name": "24799", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24799" }, { "name": "DSA-882", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-882" }, { "name": "20051202 Cisco Security Notice: Response to OpenSSL - Potential SSL 2.0 Rollback", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml" }, { "name": "17153", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17153" }, { "name": "SSRT071299", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "TSLSA-2005-0059", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html" }, { "name": "17191", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17191" }, { "name": "ADV-2005-2908", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2908" }, { "name": "1015032", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015032" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "17344", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17344" }, { "name": "19185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19185" }, { "name": "ADV-2005-2036", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2036" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt" }, { "name": "17589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17589" }, { "name": "ADV-2005-2710", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2710" }, { "name": "ADV-2005-3002", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/3002" }, { "name": "31492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31492" }, { "name": "17466", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17466" }, { "name": "RHSA-2008:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "17146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17146" }, { "name": "17169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17169" }, { "name": "hitachi-hicommand-security-bypass(35287)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287" }, { "name": "ADV-2007-0343", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm" }, { "name": "23280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23280" }, { "name": "APPLE-SA-2005-11-29", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=302847" }, { "name": "23843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23843" }, { "name": "17189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17189" }, { "name": "21827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21827" }, { "name": "17288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17288" }, { "name": "HPSBUX02186", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf" }, { "name": "MDKSA-2005:179", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179" }, { "name": "17632", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17632" }, { "name": "ADV-2007-0326", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0326" }, { "name": "17409", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17409" }, { "name": "25973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25973" }, { "name": "oval:org.mitre.oval:def:11454", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454" }, { "name": "17888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17888" }, { "name": "17210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17210" }, { "name": "DSA-875", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-875" }, { "name": "ADV-2006-3531", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3531" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openssl.org/news/secadv_20051011.txt" }, { "name": "17178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17178" }, { "name": "HPSBUX02174", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html" }, { "name": "17432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17432" }, { "name": "17180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17180" }, { "name": "101974", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1" }, { "name": "15647", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15647" }, { "name": "17335", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17335" }, { "name": "RHSA-2005:762", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-762.html" }, { "name": "RHSA-2005:800", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-800.html" }, { "name": "17151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17151" }, { "name": "18663", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18663" }, { "name": "17617", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17617" }, { "name": "SSRT061239", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100" }, { "name": "18045", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "17259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17259" }, { "name": "23915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23915" }, { "name": "SUSE-SA:2005:061", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html" }, { "name": "26893", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26893" }, { "name": "17389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17389" }, { "name": "ADV-2005-3056", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/3056" }, { "name": "ADV-2007-2457", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2457" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm" }, { "name": "17813", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17813" }, { "name": "15071", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15071" }, { "name": "18165", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18165" }, { "name": "23340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23340" }, { "name": "18123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18123" }, { "name": "DSA-881", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-881" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html" }, { "name": "ADV-2005-2659", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2659" }, { "name": "24799", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24799" }, { "name": "DSA-882", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-882" }, { "name": "20051202 Cisco Security Notice: Response to OpenSSL - Potential SSL 2.0 Rollback", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml" }, { "name": "17153", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17153" }, { "name": "SSRT071299", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "TSLSA-2005-0059", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html" }, { "name": "17191", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17191" }, { "name": "ADV-2005-2908", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2908" }, { "name": "1015032", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015032" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "17344", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17344" }, { "name": "19185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19185" }, { "name": "ADV-2005-2036", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2036" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt" }, { "name": "17589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17589" }, { "name": "ADV-2005-2710", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2710" }, { "name": "ADV-2005-3002", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/3002" }, { "name": "31492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31492" }, { "name": "17466", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17466" }, { "name": "RHSA-2008:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "17146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17146" }, { "name": "17169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17169" }, { "name": "hitachi-hicommand-security-bypass(35287)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287" }, { "name": "ADV-2007-0343", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm" }, { "name": "23280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23280" }, { "name": "APPLE-SA-2005-11-29", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://docs.info.apple.com/article.html?artnum=302847" }, { "name": "23843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23843" }, { "name": "17189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17189" }, { "name": "21827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21827" }, { "name": "17288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17288" }, { "name": "HPSBUX02186", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "tags": [ "x_refsource_MISC" ], "url": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf" }, { "name": "MDKSA-2005:179", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179" }, { "name": "17632", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17632" }, { "name": "ADV-2007-0326", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0326" }, { "name": "17409", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17409" }, { "name": "25973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25973" }, { "name": "oval:org.mitre.oval:def:11454", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454" }, { "name": "17888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17888" }, { "name": "17210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17210" }, { "name": "DSA-875", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-875" }, { "name": "ADV-2006-3531", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3531" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openssl.org/news/secadv_20051011.txt" }, { "name": "17178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17178" }, { "name": "HPSBUX02174", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html" }, { "name": "17432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17432" }, { "name": "17180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17180" }, { "name": "101974", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1" }, { "name": "15647", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15647" }, { "name": "17335", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17335" }, { "name": "RHSA-2005:762", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-762.html" }, { "name": "RHSA-2005:800", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-800.html" }, { "name": "17151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17151" }, { "name": "18663", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18663" }, { "name": "17617", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17617" }, { "name": "SSRT061239", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100" }, { "name": "18045", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18045" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-2969", "datePublished": "2005-10-18T04:00:00", "dateReserved": "2005-09-19T00:00:00", "dateUpdated": "2024-08-07T22:53:29.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-2969\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2005-10-18T21:02:00.000\",\"lastModified\":\"2024-11-21T00:00:49.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A518E8-21BE-4C5C-B425-410AB1208E9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E79A05-64F3-4397-952C-A5BB950C967D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549BB01D-F322-4FE3-BDA2-4FEA8ED8568A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98693865-2E79-4BD6-9F89-1994BC9A3E73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6476506-EC37-4726-82DC-D0E8254A8CDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6ECEF7-CB16-4604-894B-6EB19F1CEF55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=302847\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17146\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17151\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17153\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17169\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17178\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17180\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17189\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17191\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17210\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17259\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17288\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17335\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17344\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17389\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17409\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17432\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17466\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17589\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17617\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17632\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17813\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17888\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18045\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18123\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18165\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/18663\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/19185\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21827\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23280\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23340\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23843\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23915\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25973\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26893\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1015032\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2005/dsa-875\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2005/dsa-881\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2005/dsa-882\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:179\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_61_openssl.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openssl.org/news/secadv_20051011.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-762.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-800.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/15071\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/15647\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/24799\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2036\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2659\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2710\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2908\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/3002\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/3056\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3531\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0326\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0343\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2457\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35287\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1633\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=302847\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17146\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17151\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17153\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17191\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17335\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17344\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17389\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17409\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17589\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18165\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23280\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23843\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26893\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1015032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2005/dsa-875\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2005/dsa-881\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2005/dsa-882\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_61_openssl.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openssl.org/news/secadv_20051011.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-762.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-800.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/15071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/15647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/24799\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/2908\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/3002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/3056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3531\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0326\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}]}}" } }
gsd-2005-2969
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2005-2969", "description": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "id": "GSD-2005-2969", "references": [ "https://www.suse.com/security/cve/CVE-2005-2969.html", "https://www.debian.org/security/2005/dsa-888", "https://www.debian.org/security/2005/dsa-881", "https://www.debian.org/security/2005/dsa-882", "https://www.debian.org/security/2005/dsa-875", "https://access.redhat.com/errata/RHSA-2008:0629", "https://access.redhat.com/errata/RHSA-2008:0525", "https://access.redhat.com/errata/RHSA-2008:0264", "https://access.redhat.com/errata/RHSA-2005:882", "https://access.redhat.com/errata/RHSA-2005:800" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-2969" ], "details": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "id": "GSD-2005-2969", "modified": "2023-12-13T01:20:10.058862Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2005-2969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/31492", "refsource": "MISC", "url": "http://secunia.com/advisories/31492" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "http://secunia.com/advisories/19185", "refsource": "MISC", "url": "http://secunia.com/advisories/19185" }, { "name": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100", "refsource": "MISC", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100" }, { "name": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540", "refsource": "MISC", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "http://secunia.com/advisories/23280", "refsource": "MISC", "url": "http://secunia.com/advisories/23280" }, { "name": "http://secunia.com/advisories/23340", "refsource": "MISC", "url": "http://secunia.com/advisories/23340" }, { "name": "http://secunia.com/advisories/23915", "refsource": "MISC", "url": "http://secunia.com/advisories/23915" }, { "name": "http://secunia.com/advisories/26893", "refsource": "MISC", "url": "http://secunia.com/advisories/26893" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm" }, { "name": "http://www.vupen.com/english/advisories/2007/0343", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "name": "https://issues.rpath.com/browse/RPL-1633", "refsource": "MISC", "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "http://docs.info.apple.com/article.html?artnum=302847", "refsource": "MISC", "url": "http://docs.info.apple.com/article.html?artnum=302847" }, { "name": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html", "refsource": "MISC", "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html" }, { "name": "http://secunia.com/advisories/17813", "refsource": "MISC", "url": "http://secunia.com/advisories/17813" }, { "name": "http://www.securityfocus.com/bid/15647", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/15647" }, { "name": "http://www.vupen.com/english/advisories/2005/2659", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2005/2659" }, { "name": "http://secunia.com/advisories/17288", "refsource": "MISC", "url": "http://secunia.com/advisories/17288" }, { "name": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf", "refsource": "MISC", "url": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf" }, { "name": "http://secunia.com/advisories/17146", "refsource": "MISC", "url": "http://secunia.com/advisories/17146" }, { "name": "http://secunia.com/advisories/17151", "refsource": "MISC", "url": "http://secunia.com/advisories/17151" }, { "name": "http://secunia.com/advisories/17153", "refsource": "MISC", "url": "http://secunia.com/advisories/17153" }, { "name": "http://secunia.com/advisories/17169", "refsource": "MISC", "url": "http://secunia.com/advisories/17169" }, { "name": "http://secunia.com/advisories/17178", "refsource": "MISC", "url": "http://secunia.com/advisories/17178" }, { "name": "http://secunia.com/advisories/17180", "refsource": "MISC", "url": "http://secunia.com/advisories/17180" }, { "name": "http://secunia.com/advisories/17189", "refsource": "MISC", "url": "http://secunia.com/advisories/17189" }, { "name": "http://secunia.com/advisories/17191", "refsource": "MISC", "url": "http://secunia.com/advisories/17191" }, { "name": "http://secunia.com/advisories/17210", "refsource": "MISC", "url": "http://secunia.com/advisories/17210" }, { "name": "http://secunia.com/advisories/17259", "refsource": "MISC", "url": "http://secunia.com/advisories/17259" }, { "name": "http://secunia.com/advisories/17335", "refsource": "MISC", "url": "http://secunia.com/advisories/17335" }, { "name": "http://secunia.com/advisories/17344", "refsource": "MISC", "url": "http://secunia.com/advisories/17344" }, { "name": "http://secunia.com/advisories/17389", "refsource": "MISC", "url": "http://secunia.com/advisories/17389" }, { "name": "http://secunia.com/advisories/17409", "refsource": "MISC", "url": "http://secunia.com/advisories/17409" }, { "name": "http://secunia.com/advisories/17432", "refsource": "MISC", "url": "http://secunia.com/advisories/17432" }, { "name": "http://secunia.com/advisories/17466", "refsource": "MISC", "url": "http://secunia.com/advisories/17466" }, { "name": "http://secunia.com/advisories/17589", "refsource": "MISC", "url": "http://secunia.com/advisories/17589" }, { "name": "http://secunia.com/advisories/17617", "refsource": "MISC", "url": "http://secunia.com/advisories/17617" }, { "name": "http://secunia.com/advisories/17632", "refsource": "MISC", "url": "http://secunia.com/advisories/17632" }, { "name": "http://secunia.com/advisories/17888", "refsource": "MISC", "url": "http://secunia.com/advisories/17888" }, { "name": "http://secunia.com/advisories/18045", "refsource": "MISC", "url": "http://secunia.com/advisories/18045" }, { "name": "http://secunia.com/advisories/18123", "refsource": "MISC", "url": "http://secunia.com/advisories/18123" }, { "name": "http://secunia.com/advisories/18165", "refsource": "MISC", "url": "http://secunia.com/advisories/18165" }, { "name": "http://secunia.com/advisories/18663", "refsource": "MISC", "url": "http://secunia.com/advisories/18663" }, { "name": "http://secunia.com/advisories/21827", "refsource": "MISC", "url": "http://secunia.com/advisories/21827" }, { "name": "http://secunia.com/advisories/23843", "refsource": "MISC", "url": "http://secunia.com/advisories/23843" }, { "name": "http://secunia.com/advisories/25973", "refsource": "MISC", "url": "http://secunia.com/advisories/25973" }, { "name": "http://securitytracker.com/id?1015032", "refsource": "MISC", "url": "http://securitytracker.com/id?1015032" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm" }, { "name": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", "refsource": "MISC", "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754" }, { "name": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml", "refsource": "MISC", "url": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml" }, { "name": "http://www.debian.org/security/2005/dsa-875", "refsource": "MISC", "url": "http://www.debian.org/security/2005/dsa-875" }, { "name": "http://www.debian.org/security/2005/dsa-881", "refsource": "MISC", "url": "http://www.debian.org/security/2005/dsa-881" }, { "name": "http://www.debian.org/security/2005/dsa-882", "refsource": "MISC", "url": "http://www.debian.org/security/2005/dsa-882" }, { "name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html", "refsource": "MISC", "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html" }, { "name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html", "refsource": "MISC", "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html" }, { "name": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt", "refsource": "MISC", "url": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179" }, { "name": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html" }, { "name": "http://www.openssl.org/news/secadv_20051011.txt", "refsource": "MISC", "url": "http://www.openssl.org/news/secadv_20051011.txt" }, { "name": "http://www.redhat.com/support/errata/RHSA-2005-762.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2005-762.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2005-800.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2005-800.html" }, { "name": "http://www.securityfocus.com/bid/15071", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/15071" }, { "name": "http://www.securityfocus.com/bid/24799", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/24799" }, { "name": "http://www.vupen.com/english/advisories/2005/2036", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2005/2036" }, { "name": "http://www.vupen.com/english/advisories/2005/2710", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2005/2710" }, { "name": "http://www.vupen.com/english/advisories/2005/2908", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2005/2908" }, { "name": "http://www.vupen.com/english/advisories/2005/3002", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2005/3002" }, { "name": "http://www.vupen.com/english/advisories/2005/3056", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2005/3056" }, { "name": "http://www.vupen.com/english/advisories/2006/3531", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2006/3531" }, { "name": "http://www.vupen.com/english/advisories/2007/0326", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/0326" }, { "name": "http://www.vupen.com/english/advisories/2007/2457", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/2457" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2005-2969" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openssl.org/news/secadv_20051011.txt", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.openssl.org/news/secadv_20051011.txt" }, { "name": "RHSA-2005:800", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-800.html" }, { "name": "SUSE-SA:2005:061", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html" }, { "name": "DSA-875", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2005/dsa-875" }, { "name": "MDKSA-2005:179", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179" }, { "name": "TSLSA-2005-0059", "refsource": "TRUSTIX", "tags": [], "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html" }, { "name": "DSA-881", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2005/dsa-881" }, { "name": "DSA-882", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2005/dsa-882" }, { "name": "APPLE-SA-2005-11-29", "refsource": "APPLE", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=302847" }, { "name": "15647", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/15647" }, { "name": "17813", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17813" }, { "name": "20051202 Cisco Security Notice: Response to OpenSSL - Potential SSL 2.0 Rollback", "refsource": "CISCO", "tags": [], "url": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml" }, { "name": "17888", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17888" }, { "name": "18045", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18045" }, { "name": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", "refsource": "MISC", "tags": [], "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754" }, { "name": "15071", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/15071" }, { "name": "17151", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17151" }, { "name": "18165", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18165" }, { "name": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt", "refsource": "MISC", "tags": [], "url": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt" }, { "name": "18123", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18123" }, { "name": "1015032", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1015032" }, { "name": "17146", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17146" }, { "name": "17153", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17153" }, { "name": "17169", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17169" }, { "name": "17178", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17178" }, { "name": "17180", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17180" }, { "name": "17189", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17189" }, { "name": "17191", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17191" }, { "name": "17210", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17210" }, { "name": "17259", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17259" }, { "name": "17288", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17288" }, { "name": "17335", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17335" }, { "name": "17344", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17344" }, { "name": "17389", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17389" }, { "name": "17409", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17409" }, { "name": "17432", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17432" }, { "name": "17466", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17466" }, { "name": "17589", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17589" }, { "name": "17617", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17617" }, { "name": "17632", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17632" }, { "name": "RHSA-2005:762", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-762.html" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm" }, { "name": "18663", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18663" }, { "name": "19185", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/19185" }, { "name": "101974", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1" }, { "name": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf", "refsource": "MISC", "tags": [], "url": "ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf" }, { "name": "21827", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21827" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm" }, { "name": "23280", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23280" }, { "name": "23340", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23340" }, { "name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html" }, { "name": "23915", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23915" }, { "name": "23843", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/23843" }, { "name": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html" }, { "name": "https://issues.rpath.com/browse/RPL-1633", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-1633" }, { "name": "24799", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/24799" }, { "name": "25973", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25973" }, { "name": "26893", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26893" }, { "name": "31492", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/31492" }, { "name": "RHSA-2008:0629", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "ADV-2005-2036", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2005/2036" }, { "name": "ADV-2005-3002", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2005/3002" }, { "name": "ADV-2007-2457", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/2457" }, { "name": "ADV-2007-0343", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "name": "ADV-2005-3056", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2005/3056" }, { "name": "ADV-2005-2710", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2005/2710" }, { "name": "ADV-2007-0326", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/0326" }, { "name": "ADV-2005-2659", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2005/2659" }, { "name": "ADV-2005-2908", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2005/2908" }, { "name": "ADV-2006-3531", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3531" }, { "name": "SSRT071299", "refsource": "HP", "tags": [], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "name": "HPSBUX02174", "refsource": "HP", "tags": [], "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100" }, { "name": "hitachi-hicommand-security-bypass(35287)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287" }, { "name": "oval:org.mitre.oval:def:11454", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-05-03T01:29Z", "publishedDate": "2005-10-18T21:02Z" } } }
cve-2005-2969
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2014-05-22 18:04
Summary
OpenSSL version rollback vulnerability
Details
OpenSSL from OpenSSL Project contains a version rollback vulnerability. If a specific option is used on a server running OpenSSL, an attacker can force the client and the server to negotiate the SSL 2.0 protocol even if these parties both request TLS 1.0 protocol by crafting an attack on the communication path.
RFC 2246, defining the TLS protocol, defines that when TLS 1.0 is available, SSL 2.0 should not be used in order to avoid version rollback attacks.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000601.html", "dc:date": "2014-05-22T18:04+09:00", "dcterms:issued": "2008-05-21T00:00+09:00", "dcterms:modified": "2014-05-22T18:04+09:00", "description": "OpenSSL from OpenSSL Project contains a version rollback vulnerability. If a specific option is used on a server running OpenSSL, an attacker can force the client and the server to negotiate the SSL 2.0 protocol even if these parties both request TLS 1.0 protocol by crafting an attack on the communication path.\r\n\r\nRFC 2246, defining the TLS protocol, defines that when TLS 1.0 is available, SSL 2.0 should not be used in order to avoid version rollback attacks.", "link": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000601.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:cosminexus_application_server_enterprise", "@product": "Cosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_standard", "@product": "Cosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_version_5", "@product": "Cosminexus Application Server Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_light_version_6", "@product": "Cosminexus Developer Light Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_professional_version_6", "@product": "Cosminexus Developer Professional Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_standard_version_6", "@product": "Cosminexus Developer Standard Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_version_5", "@product": "Cosminexus Developer Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_enterprise_edition", "@product": "Cosminexus Server - Enterprise Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition", "@product": "Cosminexus Server - Standard Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition_version_4", "@product": "Cosminexus Server - Standard Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition", "@product": "Cosminexus Server - Web Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition_version_4", "@product": "Cosminexus Server - Web Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:hitachi_web_server", "@product": "Hitachi Web Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise", "@product": "uCosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition", "@product": "uCosminexus Application Server Smart Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_standard", "@product": "uCosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer", "@product": "uCosminexus Developer", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_light", "@product": "uCosminexus Developer Light", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_standard", "@product": "uCosminexus Developer Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_architect", "@product": "uCosminexus Service Architect", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_platform", "@product": "uCosminexus Service Platform", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:openssl:openssl", "@product": "OpenSSL", "@vendor": "OpenSSL Project", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:interscan_messaging_security_suite", "@product": "InterScan Messaging Security Suite", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:interscan_viruswall", "@product": "TrendMicro InterScan VirusWall", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:interscan_web_security_suite", "@product": "TrendMicro InterScan Web Security Suite", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/h:fujitsu:fmse-c301", "@product": "FMSE-C301", "@vendor": "FUJITSU", "@version": "2.2" }, { "#text": "cpe:/h:fujitsu:ipcom", "@product": "IPCOM Series", "@vendor": "FUJITSU", "@version": "2.2" }, { "#text": "cpe:/o:hp:hp-ux", "@product": "HP-UX", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/o:misc:miraclelinux_asianux_server", "@product": "Asianux Server", "@vendor": "Cybertrust Japan Co., Ltd.", "@version": "2.2" }, { "#text": "cpe:/o:redhat:enterprise_linux", "@product": "Red Hat Enterprise Linux", "@vendor": "Red Hat, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:redhat:linux_advanced_workstation", "@product": "Red Hat Linux Advanced Workstation", "@vendor": "Red Hat, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:sun:solaris", "@product": "Sun Solaris", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:turbolinux:turbolinux_appliance_server", "@product": "Turbolinux Appliance Server", "@vendor": "Turbolinux, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:turbolinux:turbolinux_fuji", "@product": "Turbolinux FUJI", "@vendor": "Turbolinux, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:turbolinux:turbolinux_multimedia", "@product": "Turbolinux Multimedia", "@vendor": "Turbolinux, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:turbolinux:turbolinux_personal", "@product": "Turbolinux Personal", "@vendor": "Turbolinux, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:turbolinux:turbolinux_server", "@product": "Turbolinux Server", "@vendor": "Turbolinux, Inc.", "@version": "2.2" }, { "#text": "cpe:/o:turbolinux:turbolinux_wizpy", "@product": "wizpy", "@vendor": "Turbolinux, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2005-000601", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN23632449/index.html", "@id": "JVN#23632449", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969", "@id": "CVE-2005-2969", "@source": "CVE" }, { "#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2005-2969", "@id": "CVE-2005-2969", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/17151/", "@id": "SA17151", "@source": "SECUNIA" }, { "#text": "http://www.securityfocus.com/bid/15071", "@id": "15071", "@source": "BID" }, { "#text": "http://www.securiteam.com/securitynews/6Y00D0AEBW.html", "@id": "6Y00D0AEBW", "@source": "SECTEAM" }, { "#text": "http://www.frsirt.com/english/advisories/2005/2036", "@id": "FrSIRT/ADV-2005-2036", "@source": "FRSIRT" } ], "title": "OpenSSL version rollback vulnerability" }
cve-2005-2969
Vulnerability from jvndb
Published
2009-02-04 17:42
Modified
2014-05-22 18:03
Summary
Multiple Vulnerabilities Concerning Hitachi Web Server
Details
Hitachi Web Server has vulnerabilities listed below:
1. A vulnerability that allows to roll back the Open SSL version when using the SSL.
2. Cross-site scripting vulnerability in contents created automatically by the Hitachi Web Server.
3. Cross-site scripting vulnerability due to inadequate processing of the Expect header.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000992.html", "dc:date": "2014-05-22T18:03+09:00", "dcterms:issued": "2009-02-04T17:42+09:00", "dcterms:modified": "2014-05-22T18:03+09:00", "description": "Hitachi Web Server has vulnerabilities listed below:\r\n\r\n1. A vulnerability that allows to roll back the Open SSL version when using the SSL.\r\n\r\n2. Cross-site scripting vulnerability in contents created automatically by the Hitachi Web Server.\r\n\r\n3. Cross-site scripting vulnerability due to inadequate processing of the Expect header.", "link": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000992.html", "sec:cpe": [ { "#text": "cpe:/a:hitachi:cosminexus_application_server_enterprise", "@product": "Cosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_standard", "@product": "Cosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_application_server_version_5", "@product": "Cosminexus Application Server Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_light_version_6", "@product": "Cosminexus Developer Light Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_professional_version_6", "@product": "Cosminexus Developer Professional Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_standard_version_6", "@product": "Cosminexus Developer Standard Version 6", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_developer_version_5", "@product": "Cosminexus Developer Version 5", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_enterprise_edition", "@product": "Cosminexus Server - Enterprise Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition", "@product": "Cosminexus Server - Standard Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition_version_4", "@product": "Cosminexus Server - Standard Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition", "@product": "Cosminexus Server - Web Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition_version_4", "@product": "Cosminexus Server - Web Edition Version 4", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:hitachi_web_server", "@product": "Hitachi Web Server", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise", "@product": "uCosminexus Application Server Enterprise", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition", "@product": "uCosminexus Application Server Smart Edition", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_application_server_standard", "@product": "uCosminexus Application Server Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer", "@product": "uCosminexus Developer", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_light", "@product": "uCosminexus Developer Light", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_developer_standard", "@product": "uCosminexus Developer Standard", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_architect", "@product": "uCosminexus Service Architect", "@vendor": "Hitachi, Ltd", "@version": "2.2" }, { "#text": "cpe:/a:hitachi:ucosminexus_service_platform", "@product": "uCosminexus Service Platform", "@vendor": "Hitachi, Ltd", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2006-000992", "sec:references": [ { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969", "@id": "CVE-2005-2969", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352", "@id": "CVE-2005-3352", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918", "@id": "CVE-2006-3918", "@source": "CVE" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0514", "@id": "CVE-2007-0514", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2969", "@id": "CVE-2005-2969", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3352", "@id": "CVE-2005-3352", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3918", "@id": "CVE-2006-3918", "@source": "NVD" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0514", "@id": "CVE-2007-0514", "@source": "NVD" }, { "#text": "http://jvndb.jvn.jp/ja/contents/2006/JVNDB-2006-000992.html", "@id": "JVNDB-2006-000992", "@source": "JVNDB_Ja" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)" } ], "title": "Multiple Vulnerabilities Concerning Hitachi Web Server" }
rhsa-2008_0264
Vulnerability from csaf_redhat
Published
2008-05-20 14:15
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,
CVE-2005-1849)
Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,
CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)
Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,
CVE-2006-4980, CVE-2006-1542)
Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to
5.0.2, which resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0264", "url": "https://access.redhat.com/errata/RHSA-2008:0264" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:57:54+00:00", "generator": { "date": "2024-11-22T01:57:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0264", "initial_release_date": "2008-05-20T14:15:00+00:00", "revision_history": [ { "date": "2008-05-20T14:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T10:16:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:57:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.0:el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2008_0525
Vulnerability from csaf_redhat
Published
2008-06-30 15:36
Modified
2024-11-22 01:57
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 4.2.3 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Several flaws in Zlib was discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream is opened by a user. (CVE-2005-2096). An attacker
could create a carefully crafted compressed stream that would cause an
application to crash if the stream is opened by a user. (CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 is used it may be possible for an attacker to forge a
PKCS #1 v1.5 signature that would be incorrectly verified by
implementations that do not check for excess data in the RSA exponentiation
result of the signature. This issue affected applications that use OpenSSL
to verify X.509 certificates as well as other uses of PKCS #1 v1.5.
(CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around could
allow an attacker, acting as a "man in the middle" to force an SSL
connection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0
or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures an error
condition was mishandled. This can result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types can take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the way that the Python repr() function handled
UTF-32/UCS-4 strings. If an application written in Python used the repr()
function on untrusted data, this could lead to a denial of service or
possibly allow the execution of arbitrary code with the privileges of the
Python application. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
may possibly cause disclosure of data stored in the memory of a Python
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application written in Python used the imageop module to process
untrusted images, it could cause the application to crash, enter an
infinite loop, or possibly execute arbitrary code with the privileges of
the Python interpreter. (CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0525", "url": "https://access.redhat.com/errata/RHSA-2008:0525" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:57:58+00:00", "generator": { "date": "2024-11-22T01:57:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0525", "initial_release_date": "2008-06-30T15:36:00+00:00", "revision_history": [ { "date": "2008-06-30T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-30T11:36:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:57:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el3" } } }, { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2008_0629
Vulnerability from csaf_redhat
Published
2008-08-13 14:16
Modified
2024-11-22 01:58
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
Notes
Topic
Red Hat Network Satellite Server version 5.1.1 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
This release corrects several security vulnerabilities in components
shipped as part of the Red Hat Network Satellite Server Solaris client. In
a typical operating environment, these components are not used by the
Satellite Server in a vulnerable manner. These security updates will reduce
risk should these components be used by other applications.
Several flaws in Zlib were discovered. An attacker could create a
carefully-crafted compressed stream that would cause an application to
crash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)
A buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()
utility function. An attacker could send a list of ciphers to an
application that used this function and overrun a buffer (CVE-2006-3738).
A flaw in the SSLv2 client code was discovered. If a client application
used OpenSSL to create an SSLv2 connection to a malicious server, that
server could cause the client to crash. (CVE-2006-4343)
An attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA
key with exponent 3 was used an attacker could, potentially, forge a PKCS
#1 v1.5 signature that would be incorrectly verified by implementations
that do not check for excess data in the RSA exponentiation result of the
signature. This issue affected applications that use OpenSSL to verify
X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. It is enabled in most servers
that use OpenSSL to provide support for SSL and TLS. This work-around was
vulnerable to a man-in-the-middle attack which allowed a remote user to
force an SSL connection to use SSL 2.0, rather than a stronger protocol,
such as SSL 3.0 or TLS 1.0. (CVE-2005-2969)
During OpenSSL parsing of certain invalid ASN.1 structures, an error
condition was mishandled. This could result in an infinite loop which
consumed system memory (CVE-2006-2937).
Certain public key types could take disproportionate amounts of time to
process in OpenSSL, leading to a denial of service. (CVE-2006-2940)
A flaw was discovered in the Python repr() function's handling of
UTF-32/UCS-4 strings. If an application used the repr() function on
untrusted data, this could lead to a denial of service or, possibly, allow
the execution of arbitrary code with the privileges of the application
using the flawed function. (CVE-2006-4980)
A flaw was discovered in the strxfrm() function of Python's locale module.
Strings generated by this function were not properly NULL-terminated. This
could, potentially, cause disclosure of data stored in the memory of an
application using this function. (CVE-2007-2052)
Multiple integer overflow flaws were discovered in Python's imageop module.
If an application used the imageop module to process untrusted images, it
could cause the application to crash, enter an infinite loop, or, possibly,
execute arbitrary code with the privileges of the Python interpreter.
(CVE-2007-4965)
A stack-based buffer overflow was discovered in the Python interpreter,
which could allow a local user to gain privileges by running a script with
a long name from the current working directory. (CVE-2006-1542)
Users of Red Hat Network Satellite Server should upgrade to these updated
packages, which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function\u0027s handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0629", "url": "https://access.redhat.com/errata/RHSA-2008:0629" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:58:01+00:00", "generator": { "date": "2024-11-22T01:58:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0629", "initial_release_date": "2008-08-13T14:16:00+00:00", "revision_history": [ { "date": "2008-08-13T14:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-13T10:16:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:58:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2005_800
Vulnerability from csaf_redhat
Published
2005-10-11 15:36
Modified
2024-11-22 00:00
Summary
Red Hat Security Advisory: openssl security update
Notes
Topic
Updated OpenSSL packages that fix various security issues are now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and
Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. This work-around is enabled in
most servers that use OpenSSL to provide support for SSL and TLS. Yutaka
Oiwa discovered that this work-around could allow an attacker, acting as a
"man in the middle" to force an SSL connection to use SSL 2.0 rather than a
stronger protocol such as SSL 3.0 or TLS 1.0. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2005-2969
to this issue.
A bug was also fixed in the way OpenSSL creates DSA signatures. A cache
timing attack was fixed in RHSA-2005-476 which caused OpenSSL to do private
key calculations with a fixed time window. The DSA fix for this was not
complete and the calculations are not always performed within a
fixed-window. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0109 to this issue.
Users are advised to upgrade to these updated packages, which remove the
MISE 3.0.2 work-around and contain patches to correct these issues.
Note: After installing this update, users are advised to either
restart all services that use OpenSSL or restart their system.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated OpenSSL packages that fix various security issues are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library.\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. This work-around is enabled in\nmost servers that use OpenSSL to provide support for SSL and TLS. Yutaka\nOiwa discovered that this work-around could allow an attacker, acting as a\n\"man in the middle\" to force an SSL connection to use SSL 2.0 rather than a\nstronger protocol such as SSL 3.0 or TLS 1.0. The Common Vulnerabilities\nand Exposures project (cve.mitre.org) has assigned the name CAN-2005-2969\nto this issue.\n\nA bug was also fixed in the way OpenSSL creates DSA signatures. A cache\ntiming attack was fixed in RHSA-2005-476 which caused OpenSSL to do private\nkey calculations with a fixed time window. The DSA fix for this was not\ncomplete and the calculations are not always performed within a\nfixed-window. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0109 to this issue.\n\nUsers are advised to upgrade to these updated packages, which remove the\nMISE 3.0.2 work-around and contain patches to correct these issues.\n\nNote: After installing this update, users are advised to either\nrestart all services that use OpenSSL or restart their system.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:800", "url": "https://access.redhat.com/errata/RHSA-2005:800" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "169863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169863" }, { "category": "external", "summary": "170036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170036" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_800.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T00:00:52+00:00", "generator": { "date": "2024-11-22T00:00:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:800", "initial_release_date": "2005-10-11T15:36:00+00:00", "revision_history": [ { "date": "2005-10-11T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-10-11T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:00:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.4.ia64", "product": { "name": "openssl096b-0:0.9.6b-22.4.ia64", "product_id": "openssl096b-0:0.9.6b-22.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.ia64", "product": { "name": "openssl-0:0.9.7a-43.4.ia64", "product_id": "openssl-0:0.9.7a-43.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.4.ia64", "product": { "name": "openssl-perl-0:0.9.7a-43.4.ia64", "product_id": "openssl-perl-0:0.9.7a-43.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.4.ia64", "product": { "name": "openssl-devel-0:0.9.7a-43.4.ia64", "product_id": "openssl-devel-0:0.9.7a-43.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.ia64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ia64", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.22.4.ia64", "product": { "name": "openssl096b-0:0.9.6b-16.22.4.ia64", "product_id": "openssl096b-0:0.9.6b-16.22.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.22.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.22.4?arch=ia64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.ia64", "product": { "name": "openssl-0:0.9.7a-33.17.ia64", "product_id": "openssl-0:0.9.7a-33.17.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=ia64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.17.ia64", "product": { "name": "openssl-devel-0:0.9.7a-33.17.ia64", "product_id": "openssl-devel-0:0.9.7a-33.17.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.17?arch=ia64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.17.ia64", "product": { "name": "openssl-perl-0:0.9.7a-33.17.ia64", "product_id": "openssl-perl-0:0.9.7a-33.17.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.17?arch=ia64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.ia64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ia64", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.4.i386", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.i386", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.4?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.4.i386", "product": { "name": "openssl096b-0:0.9.6b-22.4.i386", "product_id": "openssl096b-0:0.9.6b-22.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.4.i386", "product": { "name": "openssl-devel-0:0.9.7a-43.4.i386", "product_id": "openssl-devel-0:0.9.7a-43.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.i386", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i386", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.i386", "product": { "name": "openssl-0:0.9.7a-43.4.i386", "product_id": "openssl-0:0.9.7a-43.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.4.i386", "product": { "name": "openssl-perl-0:0.9.7a-43.4.i386", "product_id": "openssl-perl-0:0.9.7a-43.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.4?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.22.4.i386", "product": { "name": "openssl096b-0:0.9.6b-16.22.4.i386", "product_id": "openssl096b-0:0.9.6b-16.22.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.22.4?arch=i386" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.22.4?arch=i386" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.i386", "product": { "name": "openssl-0:0.9.7a-33.17.i386", "product_id": "openssl-0:0.9.7a-33.17.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=i386" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.17.i386", "product": { "name": "openssl-devel-0:0.9.7a-33.17.i386", "product_id": "openssl-devel-0:0.9.7a-33.17.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.17?arch=i386" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.17.i386", "product": { "name": "openssl-perl-0:0.9.7a-33.17.i386", "product_id": "openssl-perl-0:0.9.7a-33.17.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.17?arch=i386" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.i386", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i386", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.4.x86_64", "product": { "name": "openssl096b-0:0.9.6b-22.4.x86_64", "product_id": "openssl096b-0:0.9.6b-22.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.x86_64", "product": { "name": "openssl-0:0.9.7a-43.4.x86_64", "product_id": "openssl-0:0.9.7a-43.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.4.x86_64", "product": { "name": "openssl-perl-0:0.9.7a-43.4.x86_64", "product_id": "openssl-perl-0:0.9.7a-43.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.4.x86_64", "product": { "name": "openssl-devel-0:0.9.7a-43.4.x86_64", "product_id": "openssl-devel-0:0.9.7a-43.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.x86_64", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.22.4.x86_64", "product": { "name": "openssl096b-0:0.9.6b-16.22.4.x86_64", "product_id": "openssl096b-0:0.9.6b-16.22.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.22.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.22.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.x86_64", "product": { "name": "openssl-0:0.9.7a-33.17.x86_64", "product_id": "openssl-0:0.9.7a-33.17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.17.x86_64", "product": { "name": "openssl-devel-0:0.9.7a-33.17.x86_64", "product_id": "openssl-devel-0:0.9.7a-33.17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.17?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.17.x86_64", "product": { "name": "openssl-perl-0:0.9.7a-33.17.x86_64", "product_id": "openssl-perl-0:0.9.7a-33.17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.17?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.x86_64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.x86_64", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.4.src", "product": { "name": "openssl096b-0:0.9.6b-22.4.src", "product_id": "openssl096b-0:0.9.6b-22.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.4?arch=src" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.src", "product": { "name": "openssl-0:0.9.7a-43.4.src", "product_id": "openssl-0:0.9.7a-43.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=src" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.22.4.src", "product": { "name": "openssl096b-0:0.9.6b-16.22.4.src", "product_id": "openssl096b-0:0.9.6b-16.22.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.22.4?arch=src" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.src", "product": { "name": "openssl-0:0.9.7a-33.17.src", "product_id": "openssl-0:0.9.7a-33.17.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.4.ppc", "product": { "name": "openssl096b-0:0.9.6b-22.4.ppc", "product_id": "openssl096b-0:0.9.6b-22.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.ppc", "product": { "name": "openssl-0:0.9.7a-43.4.ppc", "product_id": "openssl-0:0.9.7a-43.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.4.ppc", "product": { "name": "openssl-perl-0:0.9.7a-43.4.ppc", "product_id": "openssl-perl-0:0.9.7a-43.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.4.ppc", "product": { "name": "openssl-devel-0:0.9.7a-43.4.ppc", "product_id": "openssl-devel-0:0.9.7a-43.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.22.4.ppc", "product": { "name": "openssl096b-0:0.9.6b-16.22.4.ppc", "product_id": "openssl096b-0:0.9.6b-16.22.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.22.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.22.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.ppc", "product": { "name": "openssl-0:0.9.7a-33.17.ppc", "product_id": "openssl-0:0.9.7a-33.17.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.17.ppc", "product": { "name": "openssl-devel-0:0.9.7a-33.17.ppc", "product_id": "openssl-devel-0:0.9.7a-33.17.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.17?arch=ppc" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.17.ppc", "product": { "name": "openssl-perl-0:0.9.7a-33.17.ppc", "product_id": "openssl-perl-0:0.9.7a-33.17.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.17?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-22.4.s390", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.s390", "product_id": "openssl096b-debuginfo-0:0.9.6b-22.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.4?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-22.4.s390", "product": { "name": "openssl096b-0:0.9.6b-22.4.s390", "product_id": "openssl096b-0:0.9.6b-22.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.s390", "product": { "name": "openssl-0:0.9.7a-43.4.s390", "product_id": "openssl-0:0.9.7a-43.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.4.s390", "product": { "name": "openssl-devel-0:0.9.7a-43.4.s390", "product_id": "openssl-devel-0:0.9.7a-43.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.s390", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.4.s390", "product": { "name": "openssl-perl-0:0.9.7a-43.4.s390", "product_id": "openssl-perl-0:0.9.7a-43.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.4?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-0:0.9.6b-16.22.4.s390", "product": { "name": "openssl096b-0:0.9.6b-16.22.4.s390", "product_id": "openssl096b-0:0.9.6b-16.22.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.22.4?arch=s390" } } }, { "category": "product_version", "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "product": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "product_id": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.22.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.s390", "product": { "name": "openssl-0:0.9.7a-33.17.s390", "product_id": "openssl-0:0.9.7a-33.17.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.s390", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.17.s390", "product": { "name": "openssl-devel-0:0.9.7a-33.17.s390", "product_id": "openssl-devel-0:0.9.7a-33.17.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.17?arch=s390" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.17.s390", "product": { "name": "openssl-perl-0:0.9.7a-33.17.s390", "product_id": "openssl-perl-0:0.9.7a-33.17.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.17?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.i686", "product": { "name": "openssl-0:0.9.7a-43.4.i686", "product_id": "openssl-0:0.9.7a-43.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.i686", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i686", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.i686", "product": { "name": "openssl-0:0.9.7a-33.17.i686", "product_id": "openssl-0:0.9.7a-33.17.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.i686", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i686", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.ppc64", "product": { "name": "openssl-0:0.9.7a-43.4.ppc64", "product_id": "openssl-0:0.9.7a-43.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.4.ppc64", "product": { "name": "openssl-devel-0:0.9.7a-43.4.ppc64", "product_id": "openssl-devel-0:0.9.7a-43.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc64", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.ppc64", "product": { "name": "openssl-0:0.9.7a-33.17.ppc64", "product_id": "openssl-0:0.9.7a-33.17.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc64", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc64", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:0.9.7a-43.4.s390x", "product": { "name": "openssl-0:0.9.7a-43.4.s390x", "product_id": "openssl-0:0.9.7a-43.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-43.4.s390x", "product": { "name": "openssl-perl-0:0.9.7a-43.4.s390x", "product_id": "openssl-perl-0:0.9.7a-43.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-43.4.s390x", "product": { "name": "openssl-devel-0:0.9.7a-43.4.s390x", "product_id": "openssl-devel-0:0.9.7a-43.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-43.4.s390x", "product": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390x", "product_id": "openssl-debuginfo-0:0.9.7a-43.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:0.9.7a-33.17.s390x", "product": { "name": "openssl-0:0.9.7a-33.17.s390x", "product_id": "openssl-0:0.9.7a-33.17.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@0.9.7a-33.17?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:0.9.7a-33.17.s390x", "product": { "name": "openssl-devel-0:0.9.7a-33.17.s390x", "product_id": "openssl-devel-0:0.9.7a-33.17.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-33.17?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:0.9.7a-33.17.s390x", "product": { "name": "openssl-perl-0:0.9.7a-33.17.s390x", "product_id": "openssl-perl-0:0.9.7a-33.17.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-33.17?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:0.9.7a-33.17.s390x", "product": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390x", "product_id": "openssl-debuginfo-0:0.9.7a-33.17.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-33.17?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.src" }, "product_reference": "openssl-0:0.9.7a-33.17.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-debuginfo-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-devel-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl-perl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.src" }, "product_reference": "openssl-0:0.9.7a-33.17.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-devel-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl-perl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.src" }, "product_reference": "openssl-0:0.9.7a-33.17.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-debuginfo-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-devel-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl-perl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.src" }, "product_reference": "openssl-0:0.9.7a-33.17.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-debuginfo-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-devel-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.17.i386" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.17.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.17.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.17.s390" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.17.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-33.17.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl-perl-0:0.9.7a-33.17.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-33.17.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.src" }, "product_reference": "openssl-0:0.9.7a-43.4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-devel-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl-perl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-22.4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.src" }, "product_reference": "openssl-0:0.9.7a-43.4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-22.4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.src" }, "product_reference": "openssl-0:0.9.7a-43.4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-devel-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl-perl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-22.4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.src" }, "product_reference": "openssl-0:0.9.7a-43.4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.i686" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-debuginfo-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.4.ppc64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-devel-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-devel-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.4.i386" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.4.ia64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.4.ppc" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.4.s390" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.4.s390x" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:0.9.7a-43.4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl-perl-0:0.9.7a-43.4.x86_64" }, "product_reference": "openssl-perl-0:0.9.7a-43.4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.4.src" }, "product_reference": "openssl096b-0:0.9.6b-22.4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.i386" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.s390" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" }, "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0109", "discovery_date": "2005-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617463" } ], "notes": [ { "category": "description", "text": "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.17.i386", "3AS:openssl-0:0.9.7a-33.17.i686", "3AS:openssl-0:0.9.7a-33.17.ia64", "3AS:openssl-0:0.9.7a-33.17.ppc", "3AS:openssl-0:0.9.7a-33.17.ppc64", "3AS:openssl-0:0.9.7a-33.17.s390", "3AS:openssl-0:0.9.7a-33.17.s390x", "3AS:openssl-0:0.9.7a-33.17.src", "3AS:openssl-0:0.9.7a-33.17.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3AS:openssl-devel-0:0.9.7a-33.17.i386", "3AS:openssl-devel-0:0.9.7a-33.17.ia64", "3AS:openssl-devel-0:0.9.7a-33.17.ppc", "3AS:openssl-devel-0:0.9.7a-33.17.s390", "3AS:openssl-devel-0:0.9.7a-33.17.s390x", "3AS:openssl-devel-0:0.9.7a-33.17.x86_64", "3AS:openssl-perl-0:0.9.7a-33.17.i386", "3AS:openssl-perl-0:0.9.7a-33.17.ia64", "3AS:openssl-perl-0:0.9.7a-33.17.ppc", "3AS:openssl-perl-0:0.9.7a-33.17.s390", "3AS:openssl-perl-0:0.9.7a-33.17.s390x", "3AS:openssl-perl-0:0.9.7a-33.17.x86_64", "3AS:openssl096b-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-0:0.9.6b-16.22.4.src", "3AS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl-0:0.9.7a-33.17.i386", "3Desktop:openssl-0:0.9.7a-33.17.i686", "3Desktop:openssl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-0:0.9.7a-33.17.s390", "3Desktop:openssl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-0:0.9.7a-33.17.src", "3Desktop:openssl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.17.i386", "3Desktop:openssl-devel-0:0.9.7a-33.17.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.17.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.17.i386", "3Desktop:openssl-perl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-0:0.9.6b-16.22.4.src", "3Desktop:openssl096b-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3ES:openssl-0:0.9.7a-33.17.i386", "3ES:openssl-0:0.9.7a-33.17.i686", "3ES:openssl-0:0.9.7a-33.17.ia64", "3ES:openssl-0:0.9.7a-33.17.ppc", "3ES:openssl-0:0.9.7a-33.17.ppc64", "3ES:openssl-0:0.9.7a-33.17.s390", "3ES:openssl-0:0.9.7a-33.17.s390x", "3ES:openssl-0:0.9.7a-33.17.src", "3ES:openssl-0:0.9.7a-33.17.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3ES:openssl-devel-0:0.9.7a-33.17.i386", "3ES:openssl-devel-0:0.9.7a-33.17.ia64", "3ES:openssl-devel-0:0.9.7a-33.17.ppc", "3ES:openssl-devel-0:0.9.7a-33.17.s390", "3ES:openssl-devel-0:0.9.7a-33.17.s390x", "3ES:openssl-devel-0:0.9.7a-33.17.x86_64", "3ES:openssl-perl-0:0.9.7a-33.17.i386", "3ES:openssl-perl-0:0.9.7a-33.17.ia64", "3ES:openssl-perl-0:0.9.7a-33.17.ppc", "3ES:openssl-perl-0:0.9.7a-33.17.s390", "3ES:openssl-perl-0:0.9.7a-33.17.s390x", "3ES:openssl-perl-0:0.9.7a-33.17.x86_64", "3ES:openssl096b-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-0:0.9.6b-16.22.4.src", "3ES:openssl096b-0:0.9.6b-16.22.4.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3WS:openssl-0:0.9.7a-33.17.i386", "3WS:openssl-0:0.9.7a-33.17.i686", "3WS:openssl-0:0.9.7a-33.17.ia64", "3WS:openssl-0:0.9.7a-33.17.ppc", "3WS:openssl-0:0.9.7a-33.17.ppc64", "3WS:openssl-0:0.9.7a-33.17.s390", "3WS:openssl-0:0.9.7a-33.17.s390x", "3WS:openssl-0:0.9.7a-33.17.src", "3WS:openssl-0:0.9.7a-33.17.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3WS:openssl-devel-0:0.9.7a-33.17.i386", "3WS:openssl-devel-0:0.9.7a-33.17.ia64", "3WS:openssl-devel-0:0.9.7a-33.17.ppc", "3WS:openssl-devel-0:0.9.7a-33.17.s390", "3WS:openssl-devel-0:0.9.7a-33.17.s390x", "3WS:openssl-devel-0:0.9.7a-33.17.x86_64", "3WS:openssl-perl-0:0.9.7a-33.17.i386", "3WS:openssl-perl-0:0.9.7a-33.17.ia64", "3WS:openssl-perl-0:0.9.7a-33.17.ppc", "3WS:openssl-perl-0:0.9.7a-33.17.s390", "3WS:openssl-perl-0:0.9.7a-33.17.s390x", "3WS:openssl-perl-0:0.9.7a-33.17.x86_64", "3WS:openssl096b-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-0:0.9.6b-16.22.4.src", "3WS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "4AS:openssl-0:0.9.7a-43.4.i386", "4AS:openssl-0:0.9.7a-43.4.i686", "4AS:openssl-0:0.9.7a-43.4.ia64", "4AS:openssl-0:0.9.7a-43.4.ppc", "4AS:openssl-0:0.9.7a-43.4.ppc64", "4AS:openssl-0:0.9.7a-43.4.s390", "4AS:openssl-0:0.9.7a-43.4.s390x", "4AS:openssl-0:0.9.7a-43.4.src", "4AS:openssl-0:0.9.7a-43.4.x86_64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4AS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4AS:openssl-devel-0:0.9.7a-43.4.i386", "4AS:openssl-devel-0:0.9.7a-43.4.ia64", "4AS:openssl-devel-0:0.9.7a-43.4.ppc", "4AS:openssl-devel-0:0.9.7a-43.4.ppc64", "4AS:openssl-devel-0:0.9.7a-43.4.s390", "4AS:openssl-devel-0:0.9.7a-43.4.s390x", "4AS:openssl-devel-0:0.9.7a-43.4.x86_64", "4AS:openssl-perl-0:0.9.7a-43.4.i386", "4AS:openssl-perl-0:0.9.7a-43.4.ia64", "4AS:openssl-perl-0:0.9.7a-43.4.ppc", "4AS:openssl-perl-0:0.9.7a-43.4.s390", "4AS:openssl-perl-0:0.9.7a-43.4.s390x", "4AS:openssl-perl-0:0.9.7a-43.4.x86_64", "4AS:openssl096b-0:0.9.6b-22.4.i386", "4AS:openssl096b-0:0.9.6b-22.4.ia64", "4AS:openssl096b-0:0.9.6b-22.4.ppc", "4AS:openssl096b-0:0.9.6b-22.4.s390", "4AS:openssl096b-0:0.9.6b-22.4.src", "4AS:openssl096b-0:0.9.6b-22.4.x86_64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4Desktop:openssl-0:0.9.7a-43.4.i386", "4Desktop:openssl-0:0.9.7a-43.4.i686", "4Desktop:openssl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-0:0.9.7a-43.4.s390", "4Desktop:openssl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-0:0.9.7a-43.4.src", "4Desktop:openssl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i386", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i686", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-devel-0:0.9.7a-43.4.i386", "4Desktop:openssl-devel-0:0.9.7a-43.4.ia64", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390x", "4Desktop:openssl-devel-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-perl-0:0.9.7a-43.4.i386", "4Desktop:openssl-perl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-perl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-perl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl096b-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-0:0.9.6b-22.4.src", "4Desktop:openssl096b-0:0.9.6b-22.4.x86_64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4ES:openssl-0:0.9.7a-43.4.i386", "4ES:openssl-0:0.9.7a-43.4.i686", "4ES:openssl-0:0.9.7a-43.4.ia64", "4ES:openssl-0:0.9.7a-43.4.ppc", "4ES:openssl-0:0.9.7a-43.4.ppc64", "4ES:openssl-0:0.9.7a-43.4.s390", "4ES:openssl-0:0.9.7a-43.4.s390x", "4ES:openssl-0:0.9.7a-43.4.src", "4ES:openssl-0:0.9.7a-43.4.x86_64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i386", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i686", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4ES:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4ES:openssl-devel-0:0.9.7a-43.4.i386", "4ES:openssl-devel-0:0.9.7a-43.4.ia64", "4ES:openssl-devel-0:0.9.7a-43.4.ppc", "4ES:openssl-devel-0:0.9.7a-43.4.ppc64", "4ES:openssl-devel-0:0.9.7a-43.4.s390", "4ES:openssl-devel-0:0.9.7a-43.4.s390x", "4ES:openssl-devel-0:0.9.7a-43.4.x86_64", "4ES:openssl-perl-0:0.9.7a-43.4.i386", "4ES:openssl-perl-0:0.9.7a-43.4.ia64", "4ES:openssl-perl-0:0.9.7a-43.4.ppc", "4ES:openssl-perl-0:0.9.7a-43.4.s390", "4ES:openssl-perl-0:0.9.7a-43.4.s390x", "4ES:openssl-perl-0:0.9.7a-43.4.x86_64", "4ES:openssl096b-0:0.9.6b-22.4.i386", "4ES:openssl096b-0:0.9.6b-22.4.ia64", "4ES:openssl096b-0:0.9.6b-22.4.ppc", "4ES:openssl096b-0:0.9.6b-22.4.s390", "4ES:openssl096b-0:0.9.6b-22.4.src", "4ES:openssl096b-0:0.9.6b-22.4.x86_64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4WS:openssl-0:0.9.7a-43.4.i386", "4WS:openssl-0:0.9.7a-43.4.i686", "4WS:openssl-0:0.9.7a-43.4.ia64", "4WS:openssl-0:0.9.7a-43.4.ppc", "4WS:openssl-0:0.9.7a-43.4.ppc64", "4WS:openssl-0:0.9.7a-43.4.s390", "4WS:openssl-0:0.9.7a-43.4.s390x", "4WS:openssl-0:0.9.7a-43.4.src", "4WS:openssl-0:0.9.7a-43.4.x86_64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4WS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4WS:openssl-devel-0:0.9.7a-43.4.i386", "4WS:openssl-devel-0:0.9.7a-43.4.ia64", "4WS:openssl-devel-0:0.9.7a-43.4.ppc", "4WS:openssl-devel-0:0.9.7a-43.4.ppc64", "4WS:openssl-devel-0:0.9.7a-43.4.s390", "4WS:openssl-devel-0:0.9.7a-43.4.s390x", "4WS:openssl-devel-0:0.9.7a-43.4.x86_64", "4WS:openssl-perl-0:0.9.7a-43.4.i386", "4WS:openssl-perl-0:0.9.7a-43.4.ia64", "4WS:openssl-perl-0:0.9.7a-43.4.ppc", "4WS:openssl-perl-0:0.9.7a-43.4.s390", "4WS:openssl-perl-0:0.9.7a-43.4.s390x", "4WS:openssl-perl-0:0.9.7a-43.4.x86_64", "4WS:openssl096b-0:0.9.6b-22.4.i386", "4WS:openssl096b-0:0.9.6b-22.4.ia64", "4WS:openssl096b-0:0.9.6b-22.4.ppc", "4WS:openssl096b-0:0.9.6b-22.4.s390", "4WS:openssl096b-0:0.9.6b-22.4.src", "4WS:openssl096b-0:0.9.6b-22.4.x86_64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0109" }, { "category": "external", "summary": "RHBZ#1617463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0109", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0109" } ], "release_date": "2005-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-11T15:36:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:openssl-0:0.9.7a-33.17.i386", "3AS:openssl-0:0.9.7a-33.17.i686", "3AS:openssl-0:0.9.7a-33.17.ia64", "3AS:openssl-0:0.9.7a-33.17.ppc", "3AS:openssl-0:0.9.7a-33.17.ppc64", "3AS:openssl-0:0.9.7a-33.17.s390", "3AS:openssl-0:0.9.7a-33.17.s390x", "3AS:openssl-0:0.9.7a-33.17.src", "3AS:openssl-0:0.9.7a-33.17.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3AS:openssl-devel-0:0.9.7a-33.17.i386", "3AS:openssl-devel-0:0.9.7a-33.17.ia64", "3AS:openssl-devel-0:0.9.7a-33.17.ppc", "3AS:openssl-devel-0:0.9.7a-33.17.s390", "3AS:openssl-devel-0:0.9.7a-33.17.s390x", "3AS:openssl-devel-0:0.9.7a-33.17.x86_64", "3AS:openssl-perl-0:0.9.7a-33.17.i386", "3AS:openssl-perl-0:0.9.7a-33.17.ia64", "3AS:openssl-perl-0:0.9.7a-33.17.ppc", "3AS:openssl-perl-0:0.9.7a-33.17.s390", "3AS:openssl-perl-0:0.9.7a-33.17.s390x", "3AS:openssl-perl-0:0.9.7a-33.17.x86_64", "3AS:openssl096b-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-0:0.9.6b-16.22.4.src", "3AS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl-0:0.9.7a-33.17.i386", "3Desktop:openssl-0:0.9.7a-33.17.i686", "3Desktop:openssl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-0:0.9.7a-33.17.s390", "3Desktop:openssl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-0:0.9.7a-33.17.src", "3Desktop:openssl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.17.i386", "3Desktop:openssl-devel-0:0.9.7a-33.17.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.17.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.17.i386", "3Desktop:openssl-perl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-0:0.9.6b-16.22.4.src", "3Desktop:openssl096b-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3ES:openssl-0:0.9.7a-33.17.i386", "3ES:openssl-0:0.9.7a-33.17.i686", "3ES:openssl-0:0.9.7a-33.17.ia64", "3ES:openssl-0:0.9.7a-33.17.ppc", "3ES:openssl-0:0.9.7a-33.17.ppc64", "3ES:openssl-0:0.9.7a-33.17.s390", "3ES:openssl-0:0.9.7a-33.17.s390x", "3ES:openssl-0:0.9.7a-33.17.src", "3ES:openssl-0:0.9.7a-33.17.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3ES:openssl-devel-0:0.9.7a-33.17.i386", "3ES:openssl-devel-0:0.9.7a-33.17.ia64", "3ES:openssl-devel-0:0.9.7a-33.17.ppc", "3ES:openssl-devel-0:0.9.7a-33.17.s390", "3ES:openssl-devel-0:0.9.7a-33.17.s390x", "3ES:openssl-devel-0:0.9.7a-33.17.x86_64", "3ES:openssl-perl-0:0.9.7a-33.17.i386", "3ES:openssl-perl-0:0.9.7a-33.17.ia64", "3ES:openssl-perl-0:0.9.7a-33.17.ppc", "3ES:openssl-perl-0:0.9.7a-33.17.s390", "3ES:openssl-perl-0:0.9.7a-33.17.s390x", "3ES:openssl-perl-0:0.9.7a-33.17.x86_64", "3ES:openssl096b-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-0:0.9.6b-16.22.4.src", "3ES:openssl096b-0:0.9.6b-16.22.4.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3WS:openssl-0:0.9.7a-33.17.i386", "3WS:openssl-0:0.9.7a-33.17.i686", "3WS:openssl-0:0.9.7a-33.17.ia64", "3WS:openssl-0:0.9.7a-33.17.ppc", "3WS:openssl-0:0.9.7a-33.17.ppc64", "3WS:openssl-0:0.9.7a-33.17.s390", "3WS:openssl-0:0.9.7a-33.17.s390x", "3WS:openssl-0:0.9.7a-33.17.src", "3WS:openssl-0:0.9.7a-33.17.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3WS:openssl-devel-0:0.9.7a-33.17.i386", "3WS:openssl-devel-0:0.9.7a-33.17.ia64", "3WS:openssl-devel-0:0.9.7a-33.17.ppc", "3WS:openssl-devel-0:0.9.7a-33.17.s390", "3WS:openssl-devel-0:0.9.7a-33.17.s390x", "3WS:openssl-devel-0:0.9.7a-33.17.x86_64", "3WS:openssl-perl-0:0.9.7a-33.17.i386", "3WS:openssl-perl-0:0.9.7a-33.17.ia64", "3WS:openssl-perl-0:0.9.7a-33.17.ppc", "3WS:openssl-perl-0:0.9.7a-33.17.s390", "3WS:openssl-perl-0:0.9.7a-33.17.s390x", "3WS:openssl-perl-0:0.9.7a-33.17.x86_64", "3WS:openssl096b-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-0:0.9.6b-16.22.4.src", "3WS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "4AS:openssl-0:0.9.7a-43.4.i386", "4AS:openssl-0:0.9.7a-43.4.i686", "4AS:openssl-0:0.9.7a-43.4.ia64", "4AS:openssl-0:0.9.7a-43.4.ppc", "4AS:openssl-0:0.9.7a-43.4.ppc64", "4AS:openssl-0:0.9.7a-43.4.s390", "4AS:openssl-0:0.9.7a-43.4.s390x", "4AS:openssl-0:0.9.7a-43.4.src", "4AS:openssl-0:0.9.7a-43.4.x86_64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4AS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4AS:openssl-devel-0:0.9.7a-43.4.i386", "4AS:openssl-devel-0:0.9.7a-43.4.ia64", "4AS:openssl-devel-0:0.9.7a-43.4.ppc", "4AS:openssl-devel-0:0.9.7a-43.4.ppc64", "4AS:openssl-devel-0:0.9.7a-43.4.s390", "4AS:openssl-devel-0:0.9.7a-43.4.s390x", "4AS:openssl-devel-0:0.9.7a-43.4.x86_64", "4AS:openssl-perl-0:0.9.7a-43.4.i386", "4AS:openssl-perl-0:0.9.7a-43.4.ia64", "4AS:openssl-perl-0:0.9.7a-43.4.ppc", "4AS:openssl-perl-0:0.9.7a-43.4.s390", "4AS:openssl-perl-0:0.9.7a-43.4.s390x", "4AS:openssl-perl-0:0.9.7a-43.4.x86_64", "4AS:openssl096b-0:0.9.6b-22.4.i386", "4AS:openssl096b-0:0.9.6b-22.4.ia64", "4AS:openssl096b-0:0.9.6b-22.4.ppc", "4AS:openssl096b-0:0.9.6b-22.4.s390", "4AS:openssl096b-0:0.9.6b-22.4.src", "4AS:openssl096b-0:0.9.6b-22.4.x86_64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4Desktop:openssl-0:0.9.7a-43.4.i386", "4Desktop:openssl-0:0.9.7a-43.4.i686", "4Desktop:openssl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-0:0.9.7a-43.4.s390", "4Desktop:openssl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-0:0.9.7a-43.4.src", "4Desktop:openssl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i386", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i686", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-devel-0:0.9.7a-43.4.i386", "4Desktop:openssl-devel-0:0.9.7a-43.4.ia64", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390x", "4Desktop:openssl-devel-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-perl-0:0.9.7a-43.4.i386", "4Desktop:openssl-perl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-perl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-perl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl096b-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-0:0.9.6b-22.4.src", "4Desktop:openssl096b-0:0.9.6b-22.4.x86_64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4ES:openssl-0:0.9.7a-43.4.i386", "4ES:openssl-0:0.9.7a-43.4.i686", "4ES:openssl-0:0.9.7a-43.4.ia64", "4ES:openssl-0:0.9.7a-43.4.ppc", "4ES:openssl-0:0.9.7a-43.4.ppc64", "4ES:openssl-0:0.9.7a-43.4.s390", "4ES:openssl-0:0.9.7a-43.4.s390x", "4ES:openssl-0:0.9.7a-43.4.src", "4ES:openssl-0:0.9.7a-43.4.x86_64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i386", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i686", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4ES:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4ES:openssl-devel-0:0.9.7a-43.4.i386", "4ES:openssl-devel-0:0.9.7a-43.4.ia64", "4ES:openssl-devel-0:0.9.7a-43.4.ppc", "4ES:openssl-devel-0:0.9.7a-43.4.ppc64", "4ES:openssl-devel-0:0.9.7a-43.4.s390", "4ES:openssl-devel-0:0.9.7a-43.4.s390x", "4ES:openssl-devel-0:0.9.7a-43.4.x86_64", "4ES:openssl-perl-0:0.9.7a-43.4.i386", "4ES:openssl-perl-0:0.9.7a-43.4.ia64", "4ES:openssl-perl-0:0.9.7a-43.4.ppc", "4ES:openssl-perl-0:0.9.7a-43.4.s390", "4ES:openssl-perl-0:0.9.7a-43.4.s390x", "4ES:openssl-perl-0:0.9.7a-43.4.x86_64", "4ES:openssl096b-0:0.9.6b-22.4.i386", "4ES:openssl096b-0:0.9.6b-22.4.ia64", "4ES:openssl096b-0:0.9.6b-22.4.ppc", "4ES:openssl096b-0:0.9.6b-22.4.s390", "4ES:openssl096b-0:0.9.6b-22.4.src", "4ES:openssl096b-0:0.9.6b-22.4.x86_64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4WS:openssl-0:0.9.7a-43.4.i386", "4WS:openssl-0:0.9.7a-43.4.i686", "4WS:openssl-0:0.9.7a-43.4.ia64", "4WS:openssl-0:0.9.7a-43.4.ppc", "4WS:openssl-0:0.9.7a-43.4.ppc64", "4WS:openssl-0:0.9.7a-43.4.s390", "4WS:openssl-0:0.9.7a-43.4.s390x", "4WS:openssl-0:0.9.7a-43.4.src", "4WS:openssl-0:0.9.7a-43.4.x86_64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4WS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4WS:openssl-devel-0:0.9.7a-43.4.i386", "4WS:openssl-devel-0:0.9.7a-43.4.ia64", "4WS:openssl-devel-0:0.9.7a-43.4.ppc", "4WS:openssl-devel-0:0.9.7a-43.4.ppc64", "4WS:openssl-devel-0:0.9.7a-43.4.s390", "4WS:openssl-devel-0:0.9.7a-43.4.s390x", "4WS:openssl-devel-0:0.9.7a-43.4.x86_64", "4WS:openssl-perl-0:0.9.7a-43.4.i386", "4WS:openssl-perl-0:0.9.7a-43.4.ia64", "4WS:openssl-perl-0:0.9.7a-43.4.ppc", "4WS:openssl-perl-0:0.9.7a-43.4.s390", "4WS:openssl-perl-0:0.9.7a-43.4.s390x", "4WS:openssl-perl-0:0.9.7a-43.4.x86_64", "4WS:openssl096b-0:0.9.6b-22.4.i386", "4WS:openssl096b-0:0.9.6b-22.4.ia64", "4WS:openssl096b-0:0.9.6b-22.4.ppc", "4WS:openssl096b-0:0.9.6b-22.4.s390", "4WS:openssl096b-0:0.9.6b-22.4.src", "4WS:openssl096b-0:0.9.6b-22.4.x86_64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:800" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:openssl-0:0.9.7a-33.17.i386", "3AS:openssl-0:0.9.7a-33.17.i686", "3AS:openssl-0:0.9.7a-33.17.ia64", "3AS:openssl-0:0.9.7a-33.17.ppc", "3AS:openssl-0:0.9.7a-33.17.ppc64", "3AS:openssl-0:0.9.7a-33.17.s390", "3AS:openssl-0:0.9.7a-33.17.s390x", "3AS:openssl-0:0.9.7a-33.17.src", "3AS:openssl-0:0.9.7a-33.17.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3AS:openssl-devel-0:0.9.7a-33.17.i386", "3AS:openssl-devel-0:0.9.7a-33.17.ia64", "3AS:openssl-devel-0:0.9.7a-33.17.ppc", "3AS:openssl-devel-0:0.9.7a-33.17.s390", "3AS:openssl-devel-0:0.9.7a-33.17.s390x", "3AS:openssl-devel-0:0.9.7a-33.17.x86_64", "3AS:openssl-perl-0:0.9.7a-33.17.i386", "3AS:openssl-perl-0:0.9.7a-33.17.ia64", "3AS:openssl-perl-0:0.9.7a-33.17.ppc", "3AS:openssl-perl-0:0.9.7a-33.17.s390", "3AS:openssl-perl-0:0.9.7a-33.17.s390x", "3AS:openssl-perl-0:0.9.7a-33.17.x86_64", "3AS:openssl096b-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-0:0.9.6b-16.22.4.src", "3AS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl-0:0.9.7a-33.17.i386", "3Desktop:openssl-0:0.9.7a-33.17.i686", "3Desktop:openssl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-0:0.9.7a-33.17.s390", "3Desktop:openssl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-0:0.9.7a-33.17.src", "3Desktop:openssl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.17.i386", "3Desktop:openssl-devel-0:0.9.7a-33.17.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.17.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.17.i386", "3Desktop:openssl-perl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-0:0.9.6b-16.22.4.src", "3Desktop:openssl096b-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3ES:openssl-0:0.9.7a-33.17.i386", "3ES:openssl-0:0.9.7a-33.17.i686", "3ES:openssl-0:0.9.7a-33.17.ia64", "3ES:openssl-0:0.9.7a-33.17.ppc", "3ES:openssl-0:0.9.7a-33.17.ppc64", "3ES:openssl-0:0.9.7a-33.17.s390", "3ES:openssl-0:0.9.7a-33.17.s390x", "3ES:openssl-0:0.9.7a-33.17.src", "3ES:openssl-0:0.9.7a-33.17.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3ES:openssl-devel-0:0.9.7a-33.17.i386", "3ES:openssl-devel-0:0.9.7a-33.17.ia64", "3ES:openssl-devel-0:0.9.7a-33.17.ppc", "3ES:openssl-devel-0:0.9.7a-33.17.s390", "3ES:openssl-devel-0:0.9.7a-33.17.s390x", "3ES:openssl-devel-0:0.9.7a-33.17.x86_64", "3ES:openssl-perl-0:0.9.7a-33.17.i386", "3ES:openssl-perl-0:0.9.7a-33.17.ia64", "3ES:openssl-perl-0:0.9.7a-33.17.ppc", "3ES:openssl-perl-0:0.9.7a-33.17.s390", "3ES:openssl-perl-0:0.9.7a-33.17.s390x", "3ES:openssl-perl-0:0.9.7a-33.17.x86_64", "3ES:openssl096b-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-0:0.9.6b-16.22.4.src", "3ES:openssl096b-0:0.9.6b-16.22.4.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3WS:openssl-0:0.9.7a-33.17.i386", "3WS:openssl-0:0.9.7a-33.17.i686", "3WS:openssl-0:0.9.7a-33.17.ia64", "3WS:openssl-0:0.9.7a-33.17.ppc", "3WS:openssl-0:0.9.7a-33.17.ppc64", "3WS:openssl-0:0.9.7a-33.17.s390", "3WS:openssl-0:0.9.7a-33.17.s390x", "3WS:openssl-0:0.9.7a-33.17.src", "3WS:openssl-0:0.9.7a-33.17.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3WS:openssl-devel-0:0.9.7a-33.17.i386", "3WS:openssl-devel-0:0.9.7a-33.17.ia64", "3WS:openssl-devel-0:0.9.7a-33.17.ppc", "3WS:openssl-devel-0:0.9.7a-33.17.s390", "3WS:openssl-devel-0:0.9.7a-33.17.s390x", "3WS:openssl-devel-0:0.9.7a-33.17.x86_64", "3WS:openssl-perl-0:0.9.7a-33.17.i386", "3WS:openssl-perl-0:0.9.7a-33.17.ia64", "3WS:openssl-perl-0:0.9.7a-33.17.ppc", "3WS:openssl-perl-0:0.9.7a-33.17.s390", "3WS:openssl-perl-0:0.9.7a-33.17.s390x", "3WS:openssl-perl-0:0.9.7a-33.17.x86_64", "3WS:openssl096b-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-0:0.9.6b-16.22.4.src", "3WS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "4AS:openssl-0:0.9.7a-43.4.i386", "4AS:openssl-0:0.9.7a-43.4.i686", "4AS:openssl-0:0.9.7a-43.4.ia64", "4AS:openssl-0:0.9.7a-43.4.ppc", "4AS:openssl-0:0.9.7a-43.4.ppc64", "4AS:openssl-0:0.9.7a-43.4.s390", "4AS:openssl-0:0.9.7a-43.4.s390x", "4AS:openssl-0:0.9.7a-43.4.src", "4AS:openssl-0:0.9.7a-43.4.x86_64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4AS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4AS:openssl-devel-0:0.9.7a-43.4.i386", "4AS:openssl-devel-0:0.9.7a-43.4.ia64", "4AS:openssl-devel-0:0.9.7a-43.4.ppc", "4AS:openssl-devel-0:0.9.7a-43.4.ppc64", "4AS:openssl-devel-0:0.9.7a-43.4.s390", "4AS:openssl-devel-0:0.9.7a-43.4.s390x", "4AS:openssl-devel-0:0.9.7a-43.4.x86_64", "4AS:openssl-perl-0:0.9.7a-43.4.i386", "4AS:openssl-perl-0:0.9.7a-43.4.ia64", "4AS:openssl-perl-0:0.9.7a-43.4.ppc", "4AS:openssl-perl-0:0.9.7a-43.4.s390", "4AS:openssl-perl-0:0.9.7a-43.4.s390x", "4AS:openssl-perl-0:0.9.7a-43.4.x86_64", "4AS:openssl096b-0:0.9.6b-22.4.i386", "4AS:openssl096b-0:0.9.6b-22.4.ia64", "4AS:openssl096b-0:0.9.6b-22.4.ppc", "4AS:openssl096b-0:0.9.6b-22.4.s390", "4AS:openssl096b-0:0.9.6b-22.4.src", "4AS:openssl096b-0:0.9.6b-22.4.x86_64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4Desktop:openssl-0:0.9.7a-43.4.i386", "4Desktop:openssl-0:0.9.7a-43.4.i686", "4Desktop:openssl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-0:0.9.7a-43.4.s390", "4Desktop:openssl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-0:0.9.7a-43.4.src", "4Desktop:openssl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i386", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i686", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-devel-0:0.9.7a-43.4.i386", "4Desktop:openssl-devel-0:0.9.7a-43.4.ia64", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390x", "4Desktop:openssl-devel-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-perl-0:0.9.7a-43.4.i386", "4Desktop:openssl-perl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-perl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-perl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl096b-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-0:0.9.6b-22.4.src", "4Desktop:openssl096b-0:0.9.6b-22.4.x86_64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4ES:openssl-0:0.9.7a-43.4.i386", "4ES:openssl-0:0.9.7a-43.4.i686", "4ES:openssl-0:0.9.7a-43.4.ia64", "4ES:openssl-0:0.9.7a-43.4.ppc", "4ES:openssl-0:0.9.7a-43.4.ppc64", "4ES:openssl-0:0.9.7a-43.4.s390", "4ES:openssl-0:0.9.7a-43.4.s390x", "4ES:openssl-0:0.9.7a-43.4.src", "4ES:openssl-0:0.9.7a-43.4.x86_64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i386", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i686", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4ES:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4ES:openssl-devel-0:0.9.7a-43.4.i386", "4ES:openssl-devel-0:0.9.7a-43.4.ia64", "4ES:openssl-devel-0:0.9.7a-43.4.ppc", "4ES:openssl-devel-0:0.9.7a-43.4.ppc64", "4ES:openssl-devel-0:0.9.7a-43.4.s390", "4ES:openssl-devel-0:0.9.7a-43.4.s390x", "4ES:openssl-devel-0:0.9.7a-43.4.x86_64", "4ES:openssl-perl-0:0.9.7a-43.4.i386", "4ES:openssl-perl-0:0.9.7a-43.4.ia64", "4ES:openssl-perl-0:0.9.7a-43.4.ppc", "4ES:openssl-perl-0:0.9.7a-43.4.s390", "4ES:openssl-perl-0:0.9.7a-43.4.s390x", "4ES:openssl-perl-0:0.9.7a-43.4.x86_64", "4ES:openssl096b-0:0.9.6b-22.4.i386", "4ES:openssl096b-0:0.9.6b-22.4.ia64", "4ES:openssl096b-0:0.9.6b-22.4.ppc", "4ES:openssl096b-0:0.9.6b-22.4.s390", "4ES:openssl096b-0:0.9.6b-22.4.src", "4ES:openssl096b-0:0.9.6b-22.4.x86_64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4WS:openssl-0:0.9.7a-43.4.i386", "4WS:openssl-0:0.9.7a-43.4.i686", "4WS:openssl-0:0.9.7a-43.4.ia64", "4WS:openssl-0:0.9.7a-43.4.ppc", "4WS:openssl-0:0.9.7a-43.4.ppc64", "4WS:openssl-0:0.9.7a-43.4.s390", "4WS:openssl-0:0.9.7a-43.4.s390x", "4WS:openssl-0:0.9.7a-43.4.src", "4WS:openssl-0:0.9.7a-43.4.x86_64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4WS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4WS:openssl-devel-0:0.9.7a-43.4.i386", "4WS:openssl-devel-0:0.9.7a-43.4.ia64", "4WS:openssl-devel-0:0.9.7a-43.4.ppc", "4WS:openssl-devel-0:0.9.7a-43.4.ppc64", "4WS:openssl-devel-0:0.9.7a-43.4.s390", "4WS:openssl-devel-0:0.9.7a-43.4.s390x", "4WS:openssl-devel-0:0.9.7a-43.4.x86_64", "4WS:openssl-perl-0:0.9.7a-43.4.i386", "4WS:openssl-perl-0:0.9.7a-43.4.ia64", "4WS:openssl-perl-0:0.9.7a-43.4.ppc", "4WS:openssl-perl-0:0.9.7a-43.4.s390", "4WS:openssl-perl-0:0.9.7a-43.4.s390x", "4WS:openssl-perl-0:0.9.7a-43.4.x86_64", "4WS:openssl096b-0:0.9.6b-22.4.i386", "4WS:openssl096b-0:0.9.6b-22.4.ia64", "4WS:openssl096b-0:0.9.6b-22.4.ppc", "4WS:openssl096b-0:0.9.6b-22.4.s390", "4WS:openssl096b-0:0.9.6b-22.4.src", "4WS:openssl096b-0:0.9.6b-22.4.x86_64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-11T15:36:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:openssl-0:0.9.7a-33.17.i386", "3AS:openssl-0:0.9.7a-33.17.i686", "3AS:openssl-0:0.9.7a-33.17.ia64", "3AS:openssl-0:0.9.7a-33.17.ppc", "3AS:openssl-0:0.9.7a-33.17.ppc64", "3AS:openssl-0:0.9.7a-33.17.s390", "3AS:openssl-0:0.9.7a-33.17.s390x", "3AS:openssl-0:0.9.7a-33.17.src", "3AS:openssl-0:0.9.7a-33.17.x86_64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3AS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3AS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3AS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3AS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3AS:openssl-devel-0:0.9.7a-33.17.i386", "3AS:openssl-devel-0:0.9.7a-33.17.ia64", "3AS:openssl-devel-0:0.9.7a-33.17.ppc", "3AS:openssl-devel-0:0.9.7a-33.17.s390", "3AS:openssl-devel-0:0.9.7a-33.17.s390x", "3AS:openssl-devel-0:0.9.7a-33.17.x86_64", "3AS:openssl-perl-0:0.9.7a-33.17.i386", "3AS:openssl-perl-0:0.9.7a-33.17.ia64", "3AS:openssl-perl-0:0.9.7a-33.17.ppc", "3AS:openssl-perl-0:0.9.7a-33.17.s390", "3AS:openssl-perl-0:0.9.7a-33.17.s390x", "3AS:openssl-perl-0:0.9.7a-33.17.x86_64", "3AS:openssl096b-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-0:0.9.6b-16.22.4.src", "3AS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3AS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl-0:0.9.7a-33.17.i386", "3Desktop:openssl-0:0.9.7a-33.17.i686", "3Desktop:openssl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-0:0.9.7a-33.17.s390", "3Desktop:openssl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-0:0.9.7a-33.17.src", "3Desktop:openssl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i386", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.i686", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3Desktop:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-devel-0:0.9.7a-33.17.i386", "3Desktop:openssl-devel-0:0.9.7a-33.17.ia64", "3Desktop:openssl-devel-0:0.9.7a-33.17.ppc", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390", "3Desktop:openssl-devel-0:0.9.7a-33.17.s390x", "3Desktop:openssl-devel-0:0.9.7a-33.17.x86_64", "3Desktop:openssl-perl-0:0.9.7a-33.17.i386", "3Desktop:openssl-perl-0:0.9.7a-33.17.ia64", "3Desktop:openssl-perl-0:0.9.7a-33.17.ppc", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390", "3Desktop:openssl-perl-0:0.9.7a-33.17.s390x", "3Desktop:openssl-perl-0:0.9.7a-33.17.x86_64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-0:0.9.6b-16.22.4.src", "3Desktop:openssl096b-0:0.9.6b-16.22.4.x86_64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3ES:openssl-0:0.9.7a-33.17.i386", "3ES:openssl-0:0.9.7a-33.17.i686", "3ES:openssl-0:0.9.7a-33.17.ia64", "3ES:openssl-0:0.9.7a-33.17.ppc", "3ES:openssl-0:0.9.7a-33.17.ppc64", "3ES:openssl-0:0.9.7a-33.17.s390", "3ES:openssl-0:0.9.7a-33.17.s390x", "3ES:openssl-0:0.9.7a-33.17.src", "3ES:openssl-0:0.9.7a-33.17.x86_64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i386", "3ES:openssl-debuginfo-0:0.9.7a-33.17.i686", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3ES:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390", "3ES:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3ES:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3ES:openssl-devel-0:0.9.7a-33.17.i386", "3ES:openssl-devel-0:0.9.7a-33.17.ia64", "3ES:openssl-devel-0:0.9.7a-33.17.ppc", "3ES:openssl-devel-0:0.9.7a-33.17.s390", "3ES:openssl-devel-0:0.9.7a-33.17.s390x", "3ES:openssl-devel-0:0.9.7a-33.17.x86_64", "3ES:openssl-perl-0:0.9.7a-33.17.i386", "3ES:openssl-perl-0:0.9.7a-33.17.ia64", "3ES:openssl-perl-0:0.9.7a-33.17.ppc", "3ES:openssl-perl-0:0.9.7a-33.17.s390", "3ES:openssl-perl-0:0.9.7a-33.17.s390x", "3ES:openssl-perl-0:0.9.7a-33.17.x86_64", "3ES:openssl096b-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-0:0.9.6b-16.22.4.src", "3ES:openssl096b-0:0.9.6b-16.22.4.x86_64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3ES:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "3WS:openssl-0:0.9.7a-33.17.i386", "3WS:openssl-0:0.9.7a-33.17.i686", "3WS:openssl-0:0.9.7a-33.17.ia64", "3WS:openssl-0:0.9.7a-33.17.ppc", "3WS:openssl-0:0.9.7a-33.17.ppc64", "3WS:openssl-0:0.9.7a-33.17.s390", "3WS:openssl-0:0.9.7a-33.17.s390x", "3WS:openssl-0:0.9.7a-33.17.src", "3WS:openssl-0:0.9.7a-33.17.x86_64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i386", "3WS:openssl-debuginfo-0:0.9.7a-33.17.i686", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ia64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc", "3WS:openssl-debuginfo-0:0.9.7a-33.17.ppc64", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390", "3WS:openssl-debuginfo-0:0.9.7a-33.17.s390x", "3WS:openssl-debuginfo-0:0.9.7a-33.17.x86_64", "3WS:openssl-devel-0:0.9.7a-33.17.i386", "3WS:openssl-devel-0:0.9.7a-33.17.ia64", "3WS:openssl-devel-0:0.9.7a-33.17.ppc", "3WS:openssl-devel-0:0.9.7a-33.17.s390", "3WS:openssl-devel-0:0.9.7a-33.17.s390x", "3WS:openssl-devel-0:0.9.7a-33.17.x86_64", "3WS:openssl-perl-0:0.9.7a-33.17.i386", "3WS:openssl-perl-0:0.9.7a-33.17.ia64", "3WS:openssl-perl-0:0.9.7a-33.17.ppc", "3WS:openssl-perl-0:0.9.7a-33.17.s390", "3WS:openssl-perl-0:0.9.7a-33.17.s390x", "3WS:openssl-perl-0:0.9.7a-33.17.x86_64", "3WS:openssl096b-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-0:0.9.6b-16.22.4.src", "3WS:openssl096b-0:0.9.6b-16.22.4.x86_64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.i386", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ia64", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.ppc", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.s390", "3WS:openssl096b-debuginfo-0:0.9.6b-16.22.4.x86_64", "4AS:openssl-0:0.9.7a-43.4.i386", "4AS:openssl-0:0.9.7a-43.4.i686", "4AS:openssl-0:0.9.7a-43.4.ia64", "4AS:openssl-0:0.9.7a-43.4.ppc", "4AS:openssl-0:0.9.7a-43.4.ppc64", "4AS:openssl-0:0.9.7a-43.4.s390", "4AS:openssl-0:0.9.7a-43.4.s390x", "4AS:openssl-0:0.9.7a-43.4.src", "4AS:openssl-0:0.9.7a-43.4.x86_64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4AS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4AS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4AS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4AS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4AS:openssl-devel-0:0.9.7a-43.4.i386", "4AS:openssl-devel-0:0.9.7a-43.4.ia64", "4AS:openssl-devel-0:0.9.7a-43.4.ppc", "4AS:openssl-devel-0:0.9.7a-43.4.ppc64", "4AS:openssl-devel-0:0.9.7a-43.4.s390", "4AS:openssl-devel-0:0.9.7a-43.4.s390x", "4AS:openssl-devel-0:0.9.7a-43.4.x86_64", "4AS:openssl-perl-0:0.9.7a-43.4.i386", "4AS:openssl-perl-0:0.9.7a-43.4.ia64", "4AS:openssl-perl-0:0.9.7a-43.4.ppc", "4AS:openssl-perl-0:0.9.7a-43.4.s390", "4AS:openssl-perl-0:0.9.7a-43.4.s390x", "4AS:openssl-perl-0:0.9.7a-43.4.x86_64", "4AS:openssl096b-0:0.9.6b-22.4.i386", "4AS:openssl096b-0:0.9.6b-22.4.ia64", "4AS:openssl096b-0:0.9.6b-22.4.ppc", "4AS:openssl096b-0:0.9.6b-22.4.s390", "4AS:openssl096b-0:0.9.6b-22.4.src", "4AS:openssl096b-0:0.9.6b-22.4.x86_64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4AS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4Desktop:openssl-0:0.9.7a-43.4.i386", "4Desktop:openssl-0:0.9.7a-43.4.i686", "4Desktop:openssl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-0:0.9.7a-43.4.s390", "4Desktop:openssl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-0:0.9.7a-43.4.src", "4Desktop:openssl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i386", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.i686", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4Desktop:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-devel-0:0.9.7a-43.4.i386", "4Desktop:openssl-devel-0:0.9.7a-43.4.ia64", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc", "4Desktop:openssl-devel-0:0.9.7a-43.4.ppc64", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390", "4Desktop:openssl-devel-0:0.9.7a-43.4.s390x", "4Desktop:openssl-devel-0:0.9.7a-43.4.x86_64", "4Desktop:openssl-perl-0:0.9.7a-43.4.i386", "4Desktop:openssl-perl-0:0.9.7a-43.4.ia64", "4Desktop:openssl-perl-0:0.9.7a-43.4.ppc", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390", "4Desktop:openssl-perl-0:0.9.7a-43.4.s390x", "4Desktop:openssl-perl-0:0.9.7a-43.4.x86_64", "4Desktop:openssl096b-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-0:0.9.6b-22.4.src", "4Desktop:openssl096b-0:0.9.6b-22.4.x86_64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4ES:openssl-0:0.9.7a-43.4.i386", "4ES:openssl-0:0.9.7a-43.4.i686", "4ES:openssl-0:0.9.7a-43.4.ia64", "4ES:openssl-0:0.9.7a-43.4.ppc", "4ES:openssl-0:0.9.7a-43.4.ppc64", "4ES:openssl-0:0.9.7a-43.4.s390", "4ES:openssl-0:0.9.7a-43.4.s390x", "4ES:openssl-0:0.9.7a-43.4.src", "4ES:openssl-0:0.9.7a-43.4.x86_64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i386", "4ES:openssl-debuginfo-0:0.9.7a-43.4.i686", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4ES:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390", "4ES:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4ES:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4ES:openssl-devel-0:0.9.7a-43.4.i386", "4ES:openssl-devel-0:0.9.7a-43.4.ia64", "4ES:openssl-devel-0:0.9.7a-43.4.ppc", "4ES:openssl-devel-0:0.9.7a-43.4.ppc64", "4ES:openssl-devel-0:0.9.7a-43.4.s390", "4ES:openssl-devel-0:0.9.7a-43.4.s390x", "4ES:openssl-devel-0:0.9.7a-43.4.x86_64", "4ES:openssl-perl-0:0.9.7a-43.4.i386", "4ES:openssl-perl-0:0.9.7a-43.4.ia64", "4ES:openssl-perl-0:0.9.7a-43.4.ppc", "4ES:openssl-perl-0:0.9.7a-43.4.s390", "4ES:openssl-perl-0:0.9.7a-43.4.s390x", "4ES:openssl-perl-0:0.9.7a-43.4.x86_64", "4ES:openssl096b-0:0.9.6b-22.4.i386", "4ES:openssl096b-0:0.9.6b-22.4.ia64", "4ES:openssl096b-0:0.9.6b-22.4.ppc", "4ES:openssl096b-0:0.9.6b-22.4.s390", "4ES:openssl096b-0:0.9.6b-22.4.src", "4ES:openssl096b-0:0.9.6b-22.4.x86_64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4ES:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64", "4WS:openssl-0:0.9.7a-43.4.i386", "4WS:openssl-0:0.9.7a-43.4.i686", "4WS:openssl-0:0.9.7a-43.4.ia64", "4WS:openssl-0:0.9.7a-43.4.ppc", "4WS:openssl-0:0.9.7a-43.4.ppc64", "4WS:openssl-0:0.9.7a-43.4.s390", "4WS:openssl-0:0.9.7a-43.4.s390x", "4WS:openssl-0:0.9.7a-43.4.src", "4WS:openssl-0:0.9.7a-43.4.x86_64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i386", "4WS:openssl-debuginfo-0:0.9.7a-43.4.i686", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ia64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc", "4WS:openssl-debuginfo-0:0.9.7a-43.4.ppc64", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390", "4WS:openssl-debuginfo-0:0.9.7a-43.4.s390x", "4WS:openssl-debuginfo-0:0.9.7a-43.4.x86_64", "4WS:openssl-devel-0:0.9.7a-43.4.i386", "4WS:openssl-devel-0:0.9.7a-43.4.ia64", "4WS:openssl-devel-0:0.9.7a-43.4.ppc", "4WS:openssl-devel-0:0.9.7a-43.4.ppc64", "4WS:openssl-devel-0:0.9.7a-43.4.s390", "4WS:openssl-devel-0:0.9.7a-43.4.s390x", "4WS:openssl-devel-0:0.9.7a-43.4.x86_64", "4WS:openssl-perl-0:0.9.7a-43.4.i386", "4WS:openssl-perl-0:0.9.7a-43.4.ia64", "4WS:openssl-perl-0:0.9.7a-43.4.ppc", "4WS:openssl-perl-0:0.9.7a-43.4.s390", "4WS:openssl-perl-0:0.9.7a-43.4.s390x", "4WS:openssl-perl-0:0.9.7a-43.4.x86_64", "4WS:openssl096b-0:0.9.6b-22.4.i386", "4WS:openssl096b-0:0.9.6b-22.4.ia64", "4WS:openssl096b-0:0.9.6b-22.4.ppc", "4WS:openssl096b-0:0.9.6b-22.4.s390", "4WS:openssl096b-0:0.9.6b-22.4.src", "4WS:openssl096b-0:0.9.6b-22.4.x86_64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.i386", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ia64", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.ppc", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.s390", "4WS:openssl096b-debuginfo-0:0.9.6b-22.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:800" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" } ] }
rhsa-2005_882
Vulnerability from csaf_redhat
Published
2005-12-19 17:29
Modified
2024-11-22 00:00
Summary
Red Hat Security Advisory: openssl, php, mod_ssl, mod_imap security update for Stronghold
Notes
Topic
Updated versions of cross-platform Stronghold that fix security issues in
mod_ssl, mod_imap, OpenSSL, and PHP are now available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
Stronghold 4 contains a number of open source technologies, including
mod_ssl and the Apache HTTP Server.
Several security issues have been found that affect cross-platform
Stronghold 4:
A flaw in mod_imap when using the Referer directive with image maps. With
certain site configurations, a remote attacker could perform a cross-site
scripting attack if a victim can be forced to visit a malicious URL using
certain web browsers. (CVE-2005-3352)
A flaw in mod_ssl triggered if a virtual host was configured using
"SSLVerifyClient optional" and a directive "SSLVerifyClient required" is
set for a specific location. For servers configured in this fashion, an
attacker may be able to access resources that should otherwise be
protected. (CVE-2005-2700)
Flaws in shmop_write, pack, and unpack PHP functions. These functions are
not normally passed user-supplied data, so would require a malicious PHP
script to be exploited. (CVE-2004-1018)
Various flaws, including possible information disclosure, double free, and
negative reference index array underflow in the deserialization code of
PHP. PHP applications may use the unserialize function of untrusted user
data, which could allow a remote attacker to gain access to memory or
potentially execute arbitrary code. (CVE-2004-1019)
A flaw in the way PHP registers global variables during a file upload
request. A remote attacker could submit a carefully crafted
multipart/form-data POST request that would overwrite the $GLOBALS array,
altering expected script behavior, and possibly leading to the execution of
arbitrary PHP commands. Note that this vulnerability only affects
installations which have register_globals enabled in the PHP configuration
file, which is not a default or recommended option. (CVE-2005-3390)
A flaw in the PHP parse_str() function. If a PHP script passes only one
argument to the parse_str() function, and the script can be forced to abort
execution during operation (for example due to the memory_limit setting),
the register_globals may be enabled even if it is disabled in the PHP
configuration file. This vulnerability only affects installations that have
PHP scripts using the parse_str function in this way. (CVE-2005-3389)
A Cross-Site Scripting flaw in the phpinfo() function. If a victim can be
tricked into following a malicious URL to a site with a page displaying the
phpinfo() output, it may be possible to inject javascript or HTML content
into the displayed page or steal data such as cookies. This vulnerability
only affects installations that allow users to view the output of the
phpinfo() function. As the phpinfo() function outputs a large amount of
information about the current state of PHP, it should only be used during
debugging or if protected by authentication. (CVE-2005-3388)
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. This work-around is enabled in
most servers that use OpenSSL to provide support for SSL and TLS. Yutaka
Oiwa discovered that this work-around could allow an attacker, acting as a
"man in the middle", to force an SSL connection to use SSL 2.0 rather than
a stronger protocol such as SSL 3.0 or TLS 1.0. (CAN-2005-2969)
Colin Percival reported a cache timing attack that could allow a malicious
local user to gain portions of cryptographic keys. The OpenSSL library has
been patched to add a new fixed-window mod_exp implementation as default
for RSA, DSA, and DH private-key operations. This patch is designed to
mitigate cache timing and potentially related attacks. (CVE-2005-0109)
Stronghold users are advised to upgrade to these updated packages, which
resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated versions of cross-platform Stronghold that fix security issues in\nmod_ssl, mod_imap, OpenSSL, and PHP are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Stronghold 4 contains a number of open source technologies, including\nmod_ssl and the Apache HTTP Server.\n\nSeveral security issues have been found that affect cross-platform\nStronghold 4: \n\nA flaw in mod_imap when using the Referer directive with image maps. With\ncertain site configurations, a remote attacker could perform a cross-site\nscripting attack if a victim can be forced to visit a malicious URL using\ncertain web browsers. (CVE-2005-3352) \n\nA flaw in mod_ssl triggered if a virtual host was configured using\n\"SSLVerifyClient optional\" and a directive \"SSLVerifyClient required\" is\nset for a specific location. For servers configured in this fashion, an\nattacker may be able to access resources that should otherwise be\nprotected. (CVE-2005-2700) \n\nFlaws in shmop_write, pack, and unpack PHP functions. These functions are\nnot normally passed user-supplied data, so would require a malicious PHP\nscript to be exploited. (CVE-2004-1018) \n\nVarious flaws, including possible information disclosure, double free, and\nnegative reference index array underflow in the deserialization code of\nPHP. PHP applications may use the unserialize function of untrusted user\ndata, which could allow a remote attacker to gain access to memory or\npotentially execute arbitrary code. (CVE-2004-1019) \n\nA flaw in the way PHP registers global variables during a file upload\nrequest. A remote attacker could submit a carefully crafted\nmultipart/form-data POST request that would overwrite the $GLOBALS array,\naltering expected script behavior, and possibly leading to the execution of\narbitrary PHP commands. Note that this vulnerability only affects\ninstallations which have register_globals enabled in the PHP configuration\nfile, which is not a default or recommended option. (CVE-2005-3390)\n\nA flaw in the PHP parse_str() function. If a PHP script passes only one\nargument to the parse_str() function, and the script can be forced to abort\nexecution during operation (for example due to the memory_limit setting),\nthe register_globals may be enabled even if it is disabled in the PHP\nconfiguration file. This vulnerability only affects installations that have\nPHP scripts using the parse_str function in this way. (CVE-2005-3389)\n\nA Cross-Site Scripting flaw in the phpinfo() function. If a victim can be\ntricked into following a malicious URL to a site with a page displaying the\nphpinfo() output, it may be possible to inject javascript or HTML content\ninto the displayed page or steal data such as cookies. This vulnerability\nonly affects installations that allow users to view the output of the\nphpinfo() function. As the phpinfo() function outputs a large amount of\ninformation about the current state of PHP, it should only be used during\ndebugging or if protected by authentication. (CVE-2005-3388) \n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. This work-around is enabled in\nmost servers that use OpenSSL to provide support for SSL and TLS. Yutaka\nOiwa discovered that this work-around could allow an attacker, acting as a\n\"man in the middle\", to force an SSL connection to use SSL 2.0 rather than\na stronger protocol such as SSL 3.0 or TLS 1.0. (CAN-2005-2969)\n\nColin Percival reported a cache timing attack that could allow a malicious\nlocal user to gain portions of cryptographic keys. The OpenSSL library has\nbeen patched to add a new fixed-window mod_exp implementation as default\nfor RSA, DSA, and DH private-key operations. This patch is designed to\nmitigate cache timing and potentially related attacks. (CVE-2005-0109)\n\nStronghold users are advised to upgrade to these updated packages, which\nresolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:882", "url": "https://access.redhat.com/errata/RHSA-2005:882" }, { "category": "external", "summary": "http://stronghold.redhat.com/support/upgrade-sh4", "url": "http://stronghold.redhat.com/support/upgrade-sh4" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_882.json" } ], "title": "Red Hat Security Advisory: openssl, php, mod_ssl, mod_imap security update for Stronghold", "tracking": { "current_release_date": "2024-11-22T00:00:58+00:00", "generator": { "date": "2024-11-22T00:00:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:882", "initial_release_date": "2005-12-19T17:29:00+00:00", "revision_history": [ { "date": "2005-12-19T17:29:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-11-20T15:43:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:00:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Stronghold 4", "product": { "name": "Red Hat Stronghold 4", "product_id": "Red Hat Stronghold 4", "product_identification_helper": { "cpe": "cpe:/a:redhat:stronghold:4" } } } ], "category": "product_family", "name": "Stronghold Cross Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-1018", "discovery_date": "2004-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617352" } ], "notes": [ { "category": "description", "text": "Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an \"integer overflow/underflow\" in the pack function, or (3) an \"integer overflow/underflow\" in the unpack function. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1018" }, { "category": "external", "summary": "RHBZ#1617352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617352" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1018", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1018" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1018", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1018" } ], "release_date": "2004-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1019", "discovery_date": "2004-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617353" } ], "notes": [ { "category": "description", "text": "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1019" }, { "category": "external", "summary": "RHBZ#1617353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1019", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1019" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1019", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1019" } ], "release_date": "2004-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0109", "discovery_date": "2005-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617463" } ], "notes": [ { "category": "description", "text": "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0109" }, { "category": "external", "summary": "RHBZ#1617463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0109", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0109" } ], "release_date": "2005-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2700", "discovery_date": "2005-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617741" } ], "notes": [ { "category": "description", "text": "ssl_engine_kernel.c in mod_ssl before 2.8.24, when using \"SSLVerifyClient optional\" in the global virtual host configuration, does not properly enforce \"SSLVerifyClient require\" in a per-location context, which allows remote attackers to bypass intended access restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2700" }, { "category": "external", "summary": "RHBZ#1617741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2700", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2700" } ], "release_date": "2005-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2005-3352", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2005-12-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430524" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd cross-site scripting flaw in mod_imap", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3352" }, { "category": "external", "summary": "RHBZ#430524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3352", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3352" } ], "release_date": "2005-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd cross-site scripting flaw in mod_imap" }, { "cve": "CVE-2005-3388", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617821" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a \"stacked array assignment.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3388" }, { "category": "external", "summary": "RHBZ#1617821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3388", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3389", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617822" } ], "notes": [ { "category": "description", "text": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3389" }, { "category": "external", "summary": "RHBZ#1617822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3390", "discovery_date": "2005-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617823" } ], "notes": [ { "category": "description", "text": "The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a \"GLOBALS\" fileupload field.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3390" }, { "category": "external", "summary": "RHBZ#1617823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3390", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390" } ], "release_date": "2005-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-12-19T17:29:00+00:00", "details": "Updated Stronghold 4 packages containing backported patches to correct\nthese issues are now available via the update agent service. Run the\nfollowing command from the Stronghold 4 install root to upgrade an existing\nStronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0k patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:882" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
ghsa-h7wj-q4wv-chfq
Vulnerability from github
Published
2022-05-03 03:14
Modified
2022-05-03 03:14
Details
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
{ "affected": [], "aliases": [ "CVE-2005-2969" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-10-18T21:02:00Z", "severity": "MODERATE" }, "details": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "id": "GHSA-h7wj-q4wv-chfq", "modified": "2022-05-03T03:14:22Z", "published": "2022-05-03T03:14:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35287" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1633" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=302847" }, { "type": "WEB", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100" }, { "type": "WEB", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540" }, { "type": "WEB", "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/17146" }, { "type": "WEB", "url": "http://secunia.com/advisories/17151" }, { "type": "WEB", "url": "http://secunia.com/advisories/17153" }, { "type": "WEB", "url": "http://secunia.com/advisories/17169" }, { "type": "WEB", "url": "http://secunia.com/advisories/17178" }, { "type": "WEB", "url": "http://secunia.com/advisories/17180" }, { "type": "WEB", "url": "http://secunia.com/advisories/17189" }, { "type": "WEB", "url": "http://secunia.com/advisories/17191" }, { "type": "WEB", "url": "http://secunia.com/advisories/17210" }, { "type": "WEB", "url": "http://secunia.com/advisories/17259" }, { "type": "WEB", "url": "http://secunia.com/advisories/17288" }, { "type": "WEB", "url": "http://secunia.com/advisories/17335" }, { "type": "WEB", "url": "http://secunia.com/advisories/17344" }, { "type": "WEB", "url": "http://secunia.com/advisories/17389" }, { "type": "WEB", "url": "http://secunia.com/advisories/17409" }, { "type": "WEB", "url": "http://secunia.com/advisories/17432" }, { "type": "WEB", "url": "http://secunia.com/advisories/17466" }, { "type": "WEB", "url": "http://secunia.com/advisories/17589" }, { "type": "WEB", "url": "http://secunia.com/advisories/17617" }, { "type": "WEB", "url": "http://secunia.com/advisories/17632" }, { "type": "WEB", "url": "http://secunia.com/advisories/17813" }, { "type": "WEB", "url": "http://secunia.com/advisories/17888" }, { "type": "WEB", "url": "http://secunia.com/advisories/18045" }, { "type": "WEB", "url": "http://secunia.com/advisories/18123" }, { "type": "WEB", "url": "http://secunia.com/advisories/18165" }, { "type": "WEB", "url": "http://secunia.com/advisories/18663" }, { "type": "WEB", "url": "http://secunia.com/advisories/19185" }, { "type": "WEB", "url": "http://secunia.com/advisories/21827" }, { "type": "WEB", "url": "http://secunia.com/advisories/23280" }, { "type": "WEB", "url": "http://secunia.com/advisories/23340" }, { "type": "WEB", "url": "http://secunia.com/advisories/23843" }, { "type": "WEB", "url": "http://secunia.com/advisories/23915" }, { "type": "WEB", "url": "http://secunia.com/advisories/25973" }, { "type": "WEB", "url": "http://secunia.com/advisories/26893" }, { "type": "WEB", "url": "http://secunia.com/advisories/31492" }, { "type": "WEB", "url": "http://securitytracker.com/id?1015032" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm" }, { "type": "WEB", "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754" }, { "type": "WEB", "url": "http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-875" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-881" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-882" }, { "type": "WEB", "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html" }, { "type": "WEB", "url": "http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html" }, { "type": "WEB", "url": "http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:179" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_61_openssl.html" }, { "type": "WEB", "url": "http://www.openssl.org/news/secadv_20051011.txt" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-762.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-800.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15071" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15647" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/24799" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/2036" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/2659" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/2710" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/2908" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/3002" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/3056" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3531" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0326" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0343" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2457" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.