Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-4995 (GCVE-0-2007-4995)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:17:27.644Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962"
},
{
"name": "20071012 OpenSSL Security Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/482167/100/0/threaded"
},
{
"name": "28084",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28084"
},
{
"name": "27271",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27271"
},
{
"name": "27363",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27363"
},
{
"name": "30852",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30852"
},
{
"name": "DSA-1571",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1571"
},
{
"name": "27205",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27205"
},
{
"name": "openssl-dtls-code-execution(37185)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"
},
{
"name": "26055",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26055"
},
{
"name": "FEDORA-2007-725",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"
},
{
"name": "GLSA-200710-30",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-30.xml"
},
{
"name": "30220",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30220"
},
{
"name": "MDKSA-2007:237",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"
},
{
"name": "ADV-2007-4219",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/4219"
},
{
"name": "HPSBUX02296",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"name": "SSRT071504",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"name": "oval:org.mitre.oval:def:10288",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"
},
{
"name": "27217",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27217"
},
{
"name": "RHSA-2007:0964",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0964.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=195634"
},
{
"name": "30161",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30161"
},
{
"name": "GLSA-200805-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"name": "27434",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27434"
},
{
"name": "SUSE-SR:2007:021",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"name": "ADV-2007-3487",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3487"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"name": "25878",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25878"
},
{
"name": "1018810",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018810"
},
{
"name": "ADV-2008-1937",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1937/references"
},
{
"name": "USN-534-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/534-1/"
},
{
"name": "27933",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27933"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962"
},
{
"name": "20071012 OpenSSL Security Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/482167/100/0/threaded"
},
{
"name": "28084",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28084"
},
{
"name": "27271",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27271"
},
{
"name": "27363",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27363"
},
{
"name": "30852",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30852"
},
{
"name": "DSA-1571",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1571"
},
{
"name": "27205",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27205"
},
{
"name": "openssl-dtls-code-execution(37185)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"
},
{
"name": "26055",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26055"
},
{
"name": "FEDORA-2007-725",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"
},
{
"name": "GLSA-200710-30",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-30.xml"
},
{
"name": "30220",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30220"
},
{
"name": "MDKSA-2007:237",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"
},
{
"name": "ADV-2007-4219",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/4219"
},
{
"name": "HPSBUX02296",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"name": "SSRT071504",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"name": "oval:org.mitre.oval:def:10288",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"
},
{
"name": "27217",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27217"
},
{
"name": "RHSA-2007:0964",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0964.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=195634"
},
{
"name": "30161",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30161"
},
{
"name": "GLSA-200805-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"name": "27434",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27434"
},
{
"name": "SUSE-SR:2007:021",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"name": "ADV-2007-3487",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3487"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"name": "25878",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25878"
},
{
"name": "1018810",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018810"
},
{
"name": "ADV-2008-1937",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1937/references"
},
{
"name": "USN-534-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/534-1/"
},
{
"name": "27933",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27933"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-4995",
"datePublished": "2007-10-13T01:00:00",
"dateReserved": "2007-09-20T00:00:00",
"dateUpdated": "2024-08-07T15:17:27.644Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2007-4995\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-10-13T01:17:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Un error por un paso en la implementaci\u00f3n de DTLS en OpenSSL versiones 0.9.8 anteriores a 0.9.8f, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4EA988-FC80-4170-8933-7C6663731981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F8F53B-24A1-4877-B16E-F1917C4E4E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75D3ACD5-905F-42BB-BE1A-8382E9D823BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766EA6F2-7FA4-4713-9859-9971CCD2FDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=195634\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25878\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27205\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27217\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27271\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27363\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27434\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27933\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28084\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30161\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30220\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30852\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-30.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1018810\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1571\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:237\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openssl.org/news/secadv_20071012.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0964.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/482167/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/26055\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3487\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4219\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1937/references\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/37185\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://usn.ubuntu.com/534-1/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=195634\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25878\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27205\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27271\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27363\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27434\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/28084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30220\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-30.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1018810\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1571\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openssl.org/news/secadv_20071012.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0964.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/482167/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/26055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1937/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/37185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/534-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. An update to correct this issue for Enterprise Linux 5 is available.\\nhttp://rhn.redhat.com/cve/CVE-2007-4995.html\\n\\nPlease note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.\",\"lastModified\":\"2007-10-24T00:00:00\"}]}}"
}
}
CERTA-2007-AVI-423
Vulnerability from certfr_avis
Deux vulnérabilités affectent OpenSSL. La première permet à un utilisateur malveillant d'accéder à des données sensibles. La seconde permettrait à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
Une erreur entache l'implantation de l'algorithme de multiplication avec réduction modulaire de Montgomery. Cette erreur permet à un utilisateur malveillant de reconstruire la clé secrète utilisée.
Un défaut de vérification de taille de tampon mémoire existe dans la fonction SSL_get_shared_ciphers. Cette vulnérabilité permet à un utilisateur malveillant de provoquer un déni de service et lui permettrait d'exécuter du code arbitraire à distance.
Solution
La version 0.9.8-stable corrige ces problèmes. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
OpenSSL, versions 0.9.8d et précédentes.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eOpenSSL, versions 0.9.8d et pr\u00e9c\u00e9dentes.\u003c/P\u003e",
"content": "## Description\n\nUne erreur entache l\u0027implantation de l\u0027algorithme de multiplication avec\nr\u00e9duction modulaire de Montgomery. Cette erreur permet \u00e0 un utilisateur\nmalveillant de reconstruire la cl\u00e9 secr\u00e8te utilis\u00e9e.\n\n \n \n\nUn d\u00e9faut de v\u00e9rification de taille de tampon m\u00e9moire existe dans la\nfonction SSL_get_shared_ciphers. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 un\nutilisateur malveillant de provoquer un d\u00e9ni de service et lui\npermettrait d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nLa version 0.9.8-stable corrige ces probl\u00e8mes. Se r\u00e9f\u00e9rer au bulletin de\ns\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section\nDocumentation).\n",
"cves": [
{
"name": "CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"name": "CVE-2007-4995",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4995"
},
{
"name": "CVE-2007-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3108"
}
],
"initial_release_date": "2007-10-04T00:00:00",
"last_revision_date": "2007-11-30T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:020 du 12 octobre 2007 :",
"url": "http://www.novell.com/linux/security/advisories/2007_20_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenBSD ID 17 du 10 octobre 2007 :",
"url": "http://www.openbsd.org/errata40.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:193 du 04 octobre 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:193"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2007:0964 du 12 octobre 2007 :",
"url": "https://rhn.redhat.com/errata/RHSA-2007:0964.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Blue Coat du 27 novembre 2007 :",
"url": "http://www.bluecoat.com/support/securityadvisories/advisory_openssl_rsa_key_reconstruction_vulnerability"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD SA-07:08 du 03 octobre 2007 :",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:08.openssl.asc"
},
{
"title": "Correctif OpenSSL du 29 juin 2007 :",
"url": "http://openssl.org/news/patch-CVE-2007-3108.txt"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1379-1 du 02 octobre 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1379"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-522-1 du 29 septembre 2007 :",
"url": "http://www.ubuntulinux.org/usn/usn-522-1"
},
{
"title": "Bulletin OpenSSL du 19 septembre 2007 :",
"url": "http://cvs.openssl.org/chngview?cn=16587"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200710-06 du 07 octobre 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-06.xml"
}
],
"reference": "CERTA-2007-AVI-423",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-10-04T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence CVE-2007-4995 et des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 OpenBSD, Gentoo, Red Hat, SuSE et Mandriva.",
"revision_date": "2007-10-17T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence Blue Coat.",
"revision_date": "2007-11-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s affectent OpenSSL. La premi\u00e8re permet \u00e0 un\nutilisateur malveillant d\u0027acc\u00e9der \u00e0 des donn\u00e9es sensibles. La seconde\npermettrait \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n",
"title": "Vuln\u00e9rabilit\u00e9s d\u0027OpenSSL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin Ubuntu USN-522-1 du 29 septembre 2007",
"url": null
}
]
}
fkie_cve-2007-4995
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.gentoo.org/show_bug.cgi?id=195634 | ||
| secalert@redhat.com | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773 | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html | ||
| secalert@redhat.com | http://secunia.com/advisories/25878 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27205 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27217 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27271 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27363 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27434 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27933 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/28084 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/30161 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/30220 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/30852 | Vendor Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200710-30.xml | ||
| secalert@redhat.com | http://securitytracker.com/id?1018810 | ||
| secalert@redhat.com | http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962 | ||
| secalert@redhat.com | http://www.debian.org/security/2008/dsa-1571 | ||
| secalert@redhat.com | http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:237 | ||
| secalert@redhat.com | http://www.openssl.org/news/secadv_20071012.txt | Patch | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0964.html | Vendor Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/archive/1/482167/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/26055 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2007/3487 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2007/4219 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/1937/references | Vendor Advisory | |
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/37185 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288 | ||
| secalert@redhat.com | https://usn.ubuntu.com/534-1/ | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=195634 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25878 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27205 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27217 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27271 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27363 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27434 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27933 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28084 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30161 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30220 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30852 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200710-30.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018810 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1571 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:237 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openssl.org/news/secadv_20071012.txt | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0964.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/482167/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26055 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3487 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/4219 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1937/references | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/37185 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/534-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4E446D-B9D3-45F2-9722-B41FA14A6C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "AF4EA988-FC80-4170-8933-7C6663731981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
"matchCriteriaId": "64F8F53B-24A1-4877-B16E-F1917C4E4E81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
"matchCriteriaId": "75D3ACD5-905F-42BB-BE1A-8382E9D823BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
"matchCriteriaId": "766EA6F2-7FA4-4713-9859-9971CCD2FDCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Un error por un paso en la implementaci\u00f3n de DTLS en OpenSSL versiones 0.9.8 anteriores a 0.9.8f, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de vectores no especificados."
}
],
"id": "CVE-2007-4995",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-10-13T01:17:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=195634"
},
{
"source": "secalert@redhat.com",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25878"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27205"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27217"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27271"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27363"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27434"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27933"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28084"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30161"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30220"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30852"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200710-30.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1018810"
},
{
"source": "secalert@redhat.com",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1571"
},
{
"source": "secalert@redhat.com",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0964.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/482167/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/26055"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3487"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4219"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1937/references"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"
},
{
"source": "secalert@redhat.com",
"url": "https://usn.ubuntu.com/534-1/"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=195634"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25878"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27205"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27271"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27434"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27933"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30220"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200710-30.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1018810"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1571"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0964.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/482167/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/26055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3487"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4219"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1937/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/534-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vendorComments": [
{
"comment": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. An update to correct this issue for Enterprise Linux 5 is available.\nhttp://rhn.redhat.com/cve/CVE-2007-4995.html\n\nPlease note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.",
"lastModified": "2007-10-24T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
rhsa-2007:0964
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated OpenSSL packages that correct several security issues are now\navailable for Red Hat Enterprise 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. Datagram TLS (DTLS) is a protocol\nbased on TLS that is capable of securing datagram transport (UDP for\ninstance). \n\nThe OpenSSL security team discovered a flaw in DTLS support. An attacker\ncould create a malicious client or server that could trigger a heap\noverflow. This is possibly exploitable to run arbitrary code, but it has\nnot been verified (CVE-2007-4995). Note that this flaw only affects\napplications making use of DTLS. Red Hat does not ship any DTLS client or\nserver applications in Red Hat Enterprise Linux.\n\nA flaw was found in the SSL_get_shared_ciphers() utility function. An\nattacker could send a list of ciphers to an application that used this\nfunction and overrun a buffer with a single byte (CVE-2007-5135). Few\napplications make use of this vulnerable function and generally it is used\nonly when applications are compiled for debugging.\n\nA number of possible side-channel attacks were discovered affecting\nOpenSSL. A local attacker could possibly obtain RSA private keys being\nused on a system. In practice these attacks would be difficult to perform\noutside of a lab environment. This update contains backported patches\ndesigned to mitigate these issues. (CVE-2007-3108).\n\nUsers of OpenSSL should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. \n\nPlease note that the fix for the DTLS flaw involved an overhaul of the DTLS\nhandshake processing which may introduce incompatibilities if a new client\nis used with an older server.\n\nAfter installing this update, users are advised to either restart all\nservices that use OpenSSL or restart their system.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0964",
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
},
{
"category": "external",
"summary": "245732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245732"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20071012.txt",
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "309801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=309801"
},
{
"category": "external",
"summary": "321191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=321191"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0964.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:25+00:00",
"generator": {
"date": "2025-11-21T17:32:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0964",
"initial_release_date": "2007-10-12T11:01:00+00:00",
"revision_history": [
{
"date": "2007-10-12T11:01:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-10-12T10:22:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3108",
"discovery_date": "2007-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245732"
}
],
"notes": [
{
"category": "description",
"text": "The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: RSA side-channel attack",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3108"
},
{
"category": "external",
"summary": "RHBZ#245732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3108"
}
],
"release_date": "2007-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: RSA side-channel attack"
},
{
"cve": "CVE-2007-4995",
"discovery_date": "2007-10-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "321191"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl dtls out of order vulnerabilitiy",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.\n\nPlease note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4995"
},
{
"category": "external",
"summary": "RHBZ#321191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=321191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4995",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4995"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4995",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4995"
}
],
"release_date": "2007-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl dtls out of order vulnerabilitiy"
},
{
"cve": "CVE-2007-5135",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2007-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "309801"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_get_shared_ciphers() off-by-one",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5135"
},
{
"category": "external",
"summary": "RHBZ#309801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=309801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5135"
}
],
"release_date": "2007-09-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: SSL_get_shared_ciphers() off-by-one"
}
]
}
rhsa-2007_0964
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated OpenSSL packages that correct several security issues are now\navailable for Red Hat Enterprise 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. Datagram TLS (DTLS) is a protocol\nbased on TLS that is capable of securing datagram transport (UDP for\ninstance). \n\nThe OpenSSL security team discovered a flaw in DTLS support. An attacker\ncould create a malicious client or server that could trigger a heap\noverflow. This is possibly exploitable to run arbitrary code, but it has\nnot been verified (CVE-2007-4995). Note that this flaw only affects\napplications making use of DTLS. Red Hat does not ship any DTLS client or\nserver applications in Red Hat Enterprise Linux.\n\nA flaw was found in the SSL_get_shared_ciphers() utility function. An\nattacker could send a list of ciphers to an application that used this\nfunction and overrun a buffer with a single byte (CVE-2007-5135). Few\napplications make use of this vulnerable function and generally it is used\nonly when applications are compiled for debugging.\n\nA number of possible side-channel attacks were discovered affecting\nOpenSSL. A local attacker could possibly obtain RSA private keys being\nused on a system. In practice these attacks would be difficult to perform\noutside of a lab environment. This update contains backported patches\ndesigned to mitigate these issues. (CVE-2007-3108).\n\nUsers of OpenSSL should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. \n\nPlease note that the fix for the DTLS flaw involved an overhaul of the DTLS\nhandshake processing which may introduce incompatibilities if a new client\nis used with an older server.\n\nAfter installing this update, users are advised to either restart all\nservices that use OpenSSL or restart their system.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0964",
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20071012.txt",
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "245732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245732"
},
{
"category": "external",
"summary": "309801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=309801"
},
{
"category": "external",
"summary": "321191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=321191"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0964.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T01:21:16+00:00",
"generator": {
"date": "2024-11-22T01:21:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0964",
"initial_release_date": "2007-10-12T11:01:00+00:00",
"revision_history": [
{
"date": "2007-10-12T11:01:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-10-12T10:22:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:21:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3108",
"discovery_date": "2007-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245732"
}
],
"notes": [
{
"category": "description",
"text": "The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: RSA side-channel attack",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3108"
},
{
"category": "external",
"summary": "RHBZ#245732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3108"
}
],
"release_date": "2007-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: RSA side-channel attack"
},
{
"cve": "CVE-2007-4995",
"discovery_date": "2007-10-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "321191"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl dtls out of order vulnerabilitiy",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.\n\nPlease note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4995"
},
{
"category": "external",
"summary": "RHBZ#321191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=321191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4995",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4995"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4995",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4995"
}
],
"release_date": "2007-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl dtls out of order vulnerabilitiy"
},
{
"cve": "CVE-2007-5135",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2007-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "309801"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_get_shared_ciphers() off-by-one",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5135"
},
{
"category": "external",
"summary": "RHBZ#309801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=309801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5135"
}
],
"release_date": "2007-09-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: SSL_get_shared_ciphers() off-by-one"
}
]
}
RHSA-2007:0964
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated OpenSSL packages that correct several security issues are now\navailable for Red Hat Enterprise 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and\nTransport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. Datagram TLS (DTLS) is a protocol\nbased on TLS that is capable of securing datagram transport (UDP for\ninstance). \n\nThe OpenSSL security team discovered a flaw in DTLS support. An attacker\ncould create a malicious client or server that could trigger a heap\noverflow. This is possibly exploitable to run arbitrary code, but it has\nnot been verified (CVE-2007-4995). Note that this flaw only affects\napplications making use of DTLS. Red Hat does not ship any DTLS client or\nserver applications in Red Hat Enterprise Linux.\n\nA flaw was found in the SSL_get_shared_ciphers() utility function. An\nattacker could send a list of ciphers to an application that used this\nfunction and overrun a buffer with a single byte (CVE-2007-5135). Few\napplications make use of this vulnerable function and generally it is used\nonly when applications are compiled for debugging.\n\nA number of possible side-channel attacks were discovered affecting\nOpenSSL. A local attacker could possibly obtain RSA private keys being\nused on a system. In practice these attacks would be difficult to perform\noutside of a lab environment. This update contains backported patches\ndesigned to mitigate these issues. (CVE-2007-3108).\n\nUsers of OpenSSL should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. \n\nPlease note that the fix for the DTLS flaw involved an overhaul of the DTLS\nhandshake processing which may introduce incompatibilities if a new client\nis used with an older server.\n\nAfter installing this update, users are advised to either restart all\nservices that use OpenSSL or restart their system.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0964",
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
},
{
"category": "external",
"summary": "245732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245732"
},
{
"category": "external",
"summary": "http://www.openssl.org/news/secadv_20071012.txt",
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "309801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=309801"
},
{
"category": "external",
"summary": "321191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=321191"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0964.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:25+00:00",
"generator": {
"date": "2025-11-21T17:32:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0964",
"initial_release_date": "2007-10-12T11:01:00+00:00",
"revision_history": [
{
"date": "2007-10-12T11:01:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-10-12T10:22:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product_id": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@0.9.8b-8.3.el5_0.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.src"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
},
"product_reference": "openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3108",
"discovery_date": "2007-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245732"
}
],
"notes": [
{
"category": "description",
"text": "The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: RSA side-channel attack",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3108"
},
{
"category": "external",
"summary": "RHBZ#245732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3108"
}
],
"release_date": "2007-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: RSA side-channel attack"
},
{
"cve": "CVE-2007-4995",
"discovery_date": "2007-10-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "321191"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl dtls out of order vulnerabilitiy",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.\n\nPlease note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4995"
},
{
"category": "external",
"summary": "RHBZ#321191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=321191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4995",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4995"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4995",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4995"
}
],
"release_date": "2007-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl dtls out of order vulnerabilitiy"
},
{
"cve": "CVE-2007-5135",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2007-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "309801"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: SSL_get_shared_ciphers() off-by-one",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5135"
},
{
"category": "external",
"summary": "RHBZ#309801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=309801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5135"
}
],
"release_date": "2007-09-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-10-12T11:01:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client-Workstation:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client-Workstation:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Client:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Client:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.src",
"5Server:openssl-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.i686",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-debuginfo-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.ppc64",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-devel-0:0.9.8b-8.3.el5_0.2.x86_64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.i386",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ia64",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.ppc",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.s390x",
"5Server:openssl-perl-0:0.9.8b-8.3.el5_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0964"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: SSL_get_shared_ciphers() off-by-one"
}
]
}
ghsa-wf86-8369-qhfj
Vulnerability from github
Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
{
"affected": [],
"aliases": [
"CVE-2007-4995"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-10-13T01:17:00Z",
"severity": "HIGH"
},
"details": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.",
"id": "GHSA-wf86-8369-qhfj",
"modified": "2025-04-09T03:47:19Z",
"published": "2022-05-01T18:29:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4995"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/534-1"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"
},
{
"type": "WEB",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=195634"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25878"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27205"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27217"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27271"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27363"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27434"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27933"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28084"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30161"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30220"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30852"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200710-30.xml"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1018810"
},
{
"type": "WEB",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1571"
},
{
"type": "WEB",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"
},
{
"type": "WEB",
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0964.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/482167/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/26055"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/3487"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/4219"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1937/references"
}
],
"schema_version": "1.4.0",
"severity": []
}
gsd-2007-4995
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2007-4995",
"description": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.",
"id": "GSD-2007-4995",
"references": [
"https://www.suse.com/security/cve/CVE-2007-4995.html",
"https://access.redhat.com/errata/RHSA-2007:0964",
"https://linux.oracle.com/cve/CVE-2007-4995.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-4995"
],
"details": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.",
"id": "GSD-2007-4995",
"modified": "2023-12-13T01:21:36.410901Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-4995",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"name": "http://secunia.com/advisories/27271",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27271"
},
{
"name": "http://secunia.com/advisories/30161",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30161"
},
{
"name": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
"refsource": "MISC",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"name": "http://secunia.com/advisories/27205",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27205"
},
{
"name": "http://secunia.com/advisories/30220",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30220"
},
{
"name": "http://www.debian.org/security/2008/dsa-1571",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1571"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0964.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0964.html"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=195634",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=195634"
},
{
"name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773",
"refsource": "MISC",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"name": "http://secunia.com/advisories/25878",
"refsource": "MISC",
"url": "http://secunia.com/advisories/25878"
},
{
"name": "http://secunia.com/advisories/27217",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27217"
},
{
"name": "http://secunia.com/advisories/27363",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27363"
},
{
"name": "http://secunia.com/advisories/27434",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27434"
},
{
"name": "http://secunia.com/advisories/27933",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27933"
},
{
"name": "http://secunia.com/advisories/28084",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28084"
},
{
"name": "http://secunia.com/advisories/30852",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30852"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200710-30.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200710-30.xml"
},
{
"name": "http://securitytracker.com/id?1018810",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1018810"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962",
"refsource": "MISC",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"
},
{
"name": "http://www.openssl.org/news/secadv_20071012.txt",
"refsource": "MISC",
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"name": "http://www.securityfocus.com/archive/1/482167/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/482167/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/26055",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/26055"
},
{
"name": "http://www.vupen.com/english/advisories/2007/3487",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/3487"
},
{
"name": "http://www.vupen.com/english/advisories/2007/4219",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/4219"
},
{
"name": "http://www.vupen.com/english/advisories/2008/1937/references",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/1937/references"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"
},
{
"name": "https://usn.ubuntu.com/534-1/",
"refsource": "MISC",
"url": "https://usn.ubuntu.com/534-1/"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-4995"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.openssl.org/news/secadv_20071012.txt",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://www.openssl.org/news/secadv_20071012.txt"
},
{
"name": "25878",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25878"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=195634",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=195634"
},
{
"name": "FEDORA-2007-725",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html"
},
{
"name": "GLSA-200710-30",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200710-30.xml"
},
{
"name": "MDKSA-2007:237",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:237"
},
{
"name": "RHSA-2007:0964",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0964.html"
},
{
"name": "SUSE-SR:2007:021",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html"
},
{
"name": "26055",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/26055"
},
{
"name": "1018810",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1018810"
},
{
"name": "27205",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27205"
},
{
"name": "27217",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27217"
},
{
"name": "27271",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27271"
},
{
"name": "27363",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27363"
},
{
"name": "27434",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27434"
},
{
"name": "27933",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/27933"
},
{
"name": "28084",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/28084"
},
{
"name": "DSA-1571",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1571"
},
{
"name": "GLSA-200805-07",
"refsource": "GENTOO",
"tags": [],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
},
{
"name": "30161",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30161"
},
{
"name": "30220",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30220"
},
{
"name": "ADV-2008-1937",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/1937/references"
},
{
"name": "30852",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30852"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962",
"refsource": "MISC",
"tags": [],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=738962"
},
{
"name": "HPSBUX02296",
"refsource": "HP",
"tags": [],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773"
},
{
"name": "ADV-2007-3487",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/3487"
},
{
"name": "ADV-2007-4219",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/4219"
},
{
"name": "openssl-dtls-code-execution(37185)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37185"
},
{
"name": "oval:org.mitre.oval:def:10288",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288"
},
{
"name": "USN-534-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/534-1/"
},
{
"name": "20071012 OpenSSL Security Advisory",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/482167/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-15T21:39Z",
"publishedDate": "2007-10-13T01:17Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.