Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2014-3513
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62070" }, { "name": "61073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3053" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205217" }, { "name": "70584", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70584" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "tags": [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2b0532f3984324ebe1236a63d15893792384328d" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "name": "61837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61837" }, { "name": "61207", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "59627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "HPSBMU03296", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61959" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "61058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61439", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61439" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62070" }, { "name": "61073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3053" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205217" }, { "name": "70584", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70584" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "tags": [ "vendor-advisory", "x_refsource_NETBSD" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2b0532f3984324ebe1236a63d15893792384328d" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "name": "61837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61837" }, { "name": "61207", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "59627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "HPSBMU03296", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61959" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "61058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61439", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61439" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3513", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "name": "https://www.openssl.org/news/secadv_20141015.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62070" }, { "name": "61073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3053" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205217" }, { "name": "70584", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70584" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "name": "61837", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61837" }, { "name": "61207", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "59627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "HPSBMU03296", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61959" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "name": "http://advisories.mageia.org/MGASA-2014-0416.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "61058", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61439", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61439" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3513", "datePublished": "2014-10-19T01:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-3513\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-10-19T01:55:13.887\",\"lastModified\":\"2024-11-21T02:08:16.653\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.\"},{\"lang\":\"es\",\"value\":\"Fuga de memoria en d1_srtp.c en la extensi\u00f3n DTLS SRTP en OpenSSL 1.0.1 anterior a 1.0.1j permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un mensaje de negociaci\u00f3n manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":7.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F16D65-8A46-4AC7-8970-73AB700035FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F393FF-7E6F-4671-BFBF-060162E12659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B85A09-CF8D-409D-966E-168F9959F6F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C684FB18-FDDC-4BED-A28C-C23EE6CD0094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A79A7-4FAF-4C81-8622-050008B96AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEDACCB9-8D61-49EE-9957-9E58BC7BB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4993DD56-F9E3-4AC8-AC3E-BF204B950DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E884B241-F9C3-44F8-A420-DE65F5F3D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A383620-B4F7-44A7-85DA-A4FF2E115D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0C6812-F455-49CF-B29B-9AC00306DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F2D462C-A1B4-4572-A615-BDE9DC5F1E55\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0416.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1652.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1692.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59627\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61058\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61073\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61298\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61439\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61837\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61990\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/62070\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3053\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/70584\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1031052\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2385-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2b0532f3984324ebe1236a63d15893792384328d\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.apple.com/HT205217\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.openssl.org/news/secadv_20141015.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0416.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1652.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1692.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61073\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61439\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61837\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62070\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201412-39.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/70584\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1031052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2385-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2b0532f3984324ebe1236a63d15893792384328d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT205217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openssl.org/news/secadv_20141015.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-mxph-x9r8-xwgr
Vulnerability from github
Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
{ "affected": [], "aliases": [ "CVE-2014-3513" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-10-19T01:55:00Z", "severity": "HIGH" }, "details": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.", "id": "GHSA-mxph-x9r8-xwgr", "modified": "2022-05-17T19:57:44Z", "published": "2022-05-17T19:57:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513" }, { "type": "WEB", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "type": "WEB", "url": "https://support.apple.com/HT205217" }, { "type": "WEB", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "type": "WEB", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/59627" }, { "type": "WEB", "url": "http://secunia.com/advisories/61058" }, { "type": "WEB", "url": "http://secunia.com/advisories/61073" }, { "type": "WEB", "url": "http://secunia.com/advisories/61207" }, { "type": "WEB", "url": "http://secunia.com/advisories/61298" }, { "type": "WEB", "url": "http://secunia.com/advisories/61439" }, { "type": "WEB", "url": "http://secunia.com/advisories/61837" }, { "type": "WEB", "url": "http://secunia.com/advisories/61959" }, { "type": "WEB", "url": "http://secunia.com/advisories/61990" }, { "type": "WEB", "url": "http://secunia.com/advisories/62070" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3053" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/70584" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1031052" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2385-1" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2014_1692
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Storage 2.1.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary.\n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails.\n\nThis can prevent a forceful downgrade of the communication to SSL 3.0.\nThe SSL 3.0 protocol was found to be vulnerable to the padding oracle\nattack when using block cipher suites in cipher block chaining (CBC) mode.\nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication.\n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker could\nsend multiple specially crafted handshake messages to exhaust all available\nmemory of an SSL/TLS or DTLS server. (CVE-2014-3513)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1692", "url": "https://access.redhat.com/errata/RHSA-2014:1692" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1232123", "url": "https://access.redhat.com/articles/1232123" }, { "category": "external", "summary": "1152789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152789" }, { "category": "external", "summary": "1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1692.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:37:49+00:00", "generator": { "date": "2024-11-22T08:37:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1692", "initial_release_date": "2014-10-22T17:15:52+00:00", "revision_history": [ { "date": "2014-10-22T17:15:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-22T17:15:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:37:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Storage Server 2.1", "product": { "name": "Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:2.1:server:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product_id": "openssl-0:1.0.1e-30.el6_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3513", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152953" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 5, Red Hat JBoss Enterprise Application Platform 5 and 6, and Red Hat Enterprise JBoss Enterprise Web Server 1 and 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3513" }, { "category": "external", "summary": "RHBZ#1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3513", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-22T17:15:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1692" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message" }, { "cve": "CVE-2014-3567", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl shipped with Red Hat Enterprise Linux 5; Red Hat JBoss Enterprise Application Server 5 and 6; and Red Hat JBoss Enterprise Web Server 1 and 2 because openssl-0.9.8e does not include support for session tickets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3567" }, { "category": "external", "summary": "RHBZ#1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-22T17:15:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1692" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-RHS-6.4.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-RHS-6.4.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash" } ] }
rhsa-2014_1652
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary.\n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails.\n\nThis can prevent a forceful downgrade of the communication to SSL 3.0.\nThe SSL 3.0 protocol was found to be vulnerable to the padding oracle\nattack when using block cipher suites in cipher block chaining (CBC) mode.\nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication.\n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. A remote attacker could\nsend multiple specially crafted handshake messages to exhaust all available\nmemory of an SSL/TLS or DTLS server. (CVE-2014-3513)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1652", "url": "https://access.redhat.com/errata/RHSA-2014:1652" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/1232123", "url": "https://access.redhat.com/articles/1232123" }, { "category": "external", "summary": "1152789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152789" }, { "category": "external", "summary": "1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1652.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-22T08:37:39+00:00", "generator": { "date": "2024-11-22T08:37:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1652", "initial_release_date": "2014-10-16T14:59:13+00:00", "revision_history": [ { "date": "2014-10-16T14:59:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-16T14:59:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:37:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.src", "product_id": "openssl-0:1.0.1e-30.el6_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=src" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.src", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.src", "product_id": "openssl-1:1.0.1e-34.el7_0.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.ppc", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc", "product_id": "openssl-0:1.0.1e-30.el6_6.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.s390", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390", "product_id": "openssl-0:1.0.1e-30.el6_6.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "product": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "product_id": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-30.el6_6.2?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "product": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "product_id": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-34.el7_0.6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.src", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3513", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152953" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. A remote attacker could send multiple specially crafted handshake messages to exhaust all available memory of an SSL/TLS or DTLS server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 5, Red Hat JBoss Enterprise Application Platform 5 and 6, and Red Hat Enterprise JBoss Enterprise Web Server 1 and 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3513" }, { "category": "external", "summary": "RHBZ#1152953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3513", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3513" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-16T14:59:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1652" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SRTP memory leak causes crash when using specially-crafted handshake message" }, { "cve": "CVE-2014-3567", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2014-10-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1152961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of openssl shipped with Red Hat Enterprise Linux 5; Red Hat JBoss Enterprise Application Server 5 and 6; and Red Hat JBoss Enterprise Web Server 1 and 2 because openssl-0.9.8e does not include support for session tickets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3567" }, { "category": "external", "summary": "RHBZ#1152961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1152961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3567" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv_20141015.txt", "url": "https://www.openssl.org/news/secadv_20141015.txt" } ], "release_date": "2014-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-16T14:59:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1652" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Client-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Client-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6ComputeNode-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6ComputeNode-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Server-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Server-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.src", "6Workstation-optional-6.6.z:openssl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-debuginfo-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-devel-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-perl-0:1.0.1e-30.el6_6.2.x86_64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.i686", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.ppc64", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.s390x", "6Workstation-optional-6.6.z:openssl-static-0:1.0.1e-30.el6_6.2.x86_64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Client-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Client-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7ComputeNode-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7ComputeNode-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Server-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Server-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.src", "7Workstation-optional-7.0.Z:openssl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-debuginfo-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-devel-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-libs-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-perl-1:1.0.1e-34.el7_0.6.x86_64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.i686", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.ppc64", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.s390x", "7Workstation-optional-7.0.Z:openssl-static-1:1.0.1e-34.el7_0.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash" } ] }
var-201410-0371
Vulnerability from variot
Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. ============================================================================ Ubuntu Security Notice USN-2385-1 October 16, 2014
openssl vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in OpenSSL. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.7
Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.20
Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.22
After a standard system update you need to reboot your computer to make all the necessary changes.
Release Date: 2015-04-01 Last Updated: 2015-04-01
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH), HP Smart Update Manager (SUM), and HP Version Control Agent (VCA) which are components of HP Insight Control server deployment. These vulnerabilities are related to the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" or "POODLE". The components of HP Insight Control server deployment could be exploited remotely to allow disclosure of information.
HP Insight Control server deployment includes HP System Management Homepage (SMH), HP Version Control Agent (VCA), and HP Smart Update Manager (SUM) and deploys them through the following jobs. This bulletin provides the information needed to update the vulnerable components in HP Insight Control server deployment.
Install HP Management Agents for Windows x86/x64 Install HP Management Agents for RHEL 5 x64 Install HP Management Agents for RHEL 6 x64 Install HP Management Agents for SLES 10 x64 Install HP Management Agents for SLES 11 x64 Upgrade Proliant Firmware
References:
CVE-2014-3508 CVE-2014-3509 CVE-2014-3511 CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 CVE-2014-5139 SSRT102004
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-3508 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3509 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2014-3511 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-3513 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2014-5139 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following instructions to resolve this vulnerability.
Note: For HP Insight deployment Control server v7.1.2, v7.2.0, v7.2.1 and v7.2.2, you must upgrade to v7.3.1 and follow the steps from 1 to 11 mentioned below to resolve the vulnerability.
Delete the files smh.exe from Component Copy Location listed in the following table, rows 1 and 2. Delete the files vca.exe/vcaamd64-.exe from Component Copy Location listed in the following table, rows 3 and 4. Delete the files hpsmh-7..rpm" from Component Copy Location listed in row 5. In sequence, perform the steps from left to right in the following table. First, download components from Download Link; Second, rename the component as suggested in Rename to. Third, copy the component to the location specified in Component Copy Location. Table Row Number Download Link Rename to Component Copy Location
1 http://www.hp.com/swpublishing/MTX-bd2042a1c7574aad90c4839efe smhamd64-cp023964.exe \express\hpfeatures\hpagents-ws\components\Win2008
2 http://www.hp.com/swpublishing/MTX-062078f1ae354b7e99c86c151c smhx86-cp023963.exe \express\hpfeatures\hpagents-ws\components\Win2008
3 http://www.hp.com/swpublishing/MTX-7b23e47d5d9b420b94bd1323eb vcax86 cp025295.exe \express\hpfeatures\hpagents-ws\components\Win2008
4 http://www.hp.com/swpublishing/MTX-2557aa7dc1654cf6b547c1a9e4 vcaamd64-cp025296.exe \express\hpfeatures\hpagents-ws\components\Win2008
5 http://www.hp.com/swpublishing/MTX-5827037475e44abab586463723 Do not rename the downloaded component for this step. \express\hpfeatures\hpagents-sles11-x64\components
\express\hpfeatures\hpagents-sles10-x64\components
\express\hpfeatures\hpagents-rhel5-x64\components
\express\hpfeatures\hpagents-rhel6-x64\components
6 http://www.hp.com/swpublishing/MTX-57ab6bb78b6e47a18718f44133 Do not rename the downloaded component for this step. \express\hpfeatures\hpagents-sles11-x64\components
\express\hpfeatures\hpagents-sles10-x64\components
\express\hpfeatures\hpagents-rhel5-x64\components
\express\hpfeatures\hpagents-rhel6-x64\components
7 http://www.hp.com/swpublishing/MTX-34bcab41ac7e4db299e3f5f2f1 smhx86-cp025274.exe \express\hpfeatures\hpagents-ws\components\Win2003
8 http://www.hp.com/swpublishing/MTX-00eb9ac82e86449e8c3ba101bd smhamd64-cp025275.exe \express\hpfeatures\hpagents-ws\components\Win2003
Download and extract the HP SUM component from ftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p991570621/v99346
Copy all content from extracted folder and paste at \eXpress\hpfeatures\fw-proLiant\components Initiate Install HP Management Agents for SLES 11 x64 on the target running SLES11 x64. Initiate Install HP Management Agents for SLES 10 x64 on the target running SLES10 x64. Initiate Install HP Management Agents for RHEL 6 x64 on the target running RHEL 6 x64. Initiate Install HP Management Agents for RHEL 5 x64 on the target running RHEL 5 x64. Initiate Install HP Management Agents for Windows x86/x64 job on the target running Windows.
HISTORY Version:1 (rev.1) - 1 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: openssl security update Advisory ID: RHSA-2014:1652-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1652.html Issue date: 2014-10-16 CVE Names: CVE-2014-3513 CVE-2014-3567 =====================================================================
- Summary:
Updated openssl packages that contain a backported patch to mitigate the CVE-2014-3566 issue and fix two security issues are now available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) protocols, as well as a full-strength, general purpose cryptography library.
This update adds support for the TLS Fallback Signaling Cipher Suite Value (TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade attacks against applications which re-connect using a lower SSL/TLS protocol version when the initial connection indicating the highest supported protocol version fails.
This can prevent a forceful downgrade of the communication to SSL 3.0. The SSL 3.0 protocol was found to be vulnerable to the padding oracle attack when using block cipher suites in cipher block chaining (CBC) mode. This issue is identified as CVE-2014-3566, and also known under the alias POODLE. This SSL 3.0 protocol flaw will not be addressed in a future update; it is recommended that users configure their applications to require at least TLS protocol version 1.0 for secure communication.
For additional information about this flaw, see the Knowledgebase article at https://access.redhat.com/articles/1232123
A memory leak flaw was found in the way OpenSSL parsed the DTLS Secure Real-time Transport Protocol (SRTP) extension data. (CVE-2014-3513)
A memory leak flaw was found in the way an OpenSSL handled failed session ticket integrity checks. A remote attacker could exhaust all available memory of an SSL/TLS or DTLS server by sending a large number of invalid session tickets to that server. (CVE-2014-3567)
All OpenSSL users are advised to upgrade to these updated packages, which contain backported patches to mitigate the CVE-2014-3566 issue and correct the CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect, all services linked to the OpenSSL library (such as httpd and other SSL-enabled services) must be restarted or the system rebooted.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
ppc64: openssl-1.0.1e-30.el6_6.2.ppc.rpm openssl-1.0.1e-30.el6_6.2.ppc64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.ppc.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm openssl-devel-1.0.1e-30.el6_6.2.ppc.rpm openssl-devel-1.0.1e-30.el6_6.2.ppc64.rpm
s390x: openssl-1.0.1e-30.el6_6.2.s390.rpm openssl-1.0.1e-30.el6_6.2.s390x.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.s390.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm openssl-devel-1.0.1e-30.el6_6.2.s390.rpm openssl-devel-1.0.1e-30.el6_6.2.s390x.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm
ppc64: openssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm openssl-perl-1.0.1e-30.el6_6.2.ppc64.rpm openssl-static-1.0.1e-30.el6_6.2.ppc64.rpm
s390x: openssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm openssl-perl-1.0.1e-30.el6_6.2.s390x.rpm openssl-static-1.0.1e-30.el6_6.2.s390x.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: openssl-1.0.1e-30.el6_6.2.src.rpm
i386: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-1.0.1e-30.el6_6.2.i686.rpm openssl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-devel-1.0.1e-30.el6_6.2.i686.rpm openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: openssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm openssl-perl-1.0.1e-30.el6_6.2.i686.rpm openssl-static-1.0.1e-30.el6_6.2.i686.rpm
x86_64: openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
ppc64: openssl-1.0.1e-34.el7_0.6.ppc64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm openssl-devel-1.0.1e-34.el7_0.6.ppc.rpm openssl-devel-1.0.1e-34.el7_0.6.ppc64.rpm openssl-libs-1.0.1e-34.el7_0.6.ppc.rpm openssl-libs-1.0.1e-34.el7_0.6.ppc64.rpm
s390x: openssl-1.0.1e-34.el7_0.6.s390x.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm openssl-devel-1.0.1e-34.el7_0.6.s390.rpm openssl-devel-1.0.1e-34.el7_0.6.s390x.rpm openssl-libs-1.0.1e-34.el7_0.6.s390.rpm openssl-libs-1.0.1e-34.el7_0.6.s390x.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: openssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm openssl-perl-1.0.1e-34.el7_0.6.ppc64.rpm openssl-static-1.0.1e-34.el7_0.6.ppc.rpm openssl-static-1.0.1e-34.el7_0.6.ppc64.rpm
s390x: openssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm openssl-perl-1.0.1e-34.el7_0.6.s390x.rpm openssl-static-1.0.1e-34.el7_0.6.s390.rpm openssl-static-1.0.1e-34.el7_0.6.s390x.rpm
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: openssl-1.0.1e-34.el7_0.6.src.rpm
x86_64: openssl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-devel-1.0.1e-34.el7_0.6.i686.rpm openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm openssl-libs-1.0.1e-34.el7_0.6.i686.rpm openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: openssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm openssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm openssl-static-1.0.1e-34.el7_0.6.i686.rpm openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-3513.html https://www.redhat.com/security/data/cve/CVE-2014-3567.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1232123
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFUP940XlSAg2UNWIIRAhUYAJ4or1rZ25E0BXjTPyeDsN+keTz3twCdHDEz qY686VXQQ02SLq5vTvKfuHk= =McEc -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Corrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1) 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1) 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10) 2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE) 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3) 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13) 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20) 2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE) 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17) CVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
FreeBSD includes software from the OpenSSL Project.
II. [CVE-2014-3513]. [CVE-2014-3567]. This protocol weakness makes it possible for an attacker to obtain clear text data through a padding-oracle attack.
Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE [CVE-2014-3566].
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade.
When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. [CVE-2014-3568].
III. [CVE-2014-3567].
An active man-in-the-middle attacker can force a protocol downgrade to SSLv3 and exploit the weakness of SSLv3 to obtain clear text data from the connection. [CVE-2014-3566] [CVE-2014-3568]
IV. Workaround
No workaround is available.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 10.0]
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc
gpg --verify openssl-10.0.patch.asc
[FreeBSD 9.3]
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc
gpg --verify openssl-9.3.patch.asc
[FreeBSD 8.4, 9.1 and 9.2]
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch
fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc
gpg --verify openssl-8.4.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in
Restart all deamons using the library, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/8/ r273151 releng/8.4/ r273416 stable/9/ r273151 releng/9.1/ r273415 releng/9.2/ r273415 releng/9.3/ r273415 stable/10/ r273149 releng/10.0/ r273415 releng/10.1/ r273399
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2015-09-16-2 Xcode 7.0
Xcode 7.0 is now available and addresses the following:
DevTools Available for: OS X Yosemite v10.10.4 or later Impact: An attacker may be able to bypass access restrictions Description: An API issue existed in the apache configuration. This issue was addressed by updating header files to use the latest version. CVE-ID CVE-2015-3185 : Branko Aibej of the Apache Software Foundation
IDE Xcode Server Available for: OS X Yosemite 10.10 or later Impact: An attacker may be able to access restricted parts of the filesystem Description: A comparison issue existed in the node.js send module prior to version 0.8.4. This issue was addressed by upgrading to version 0.12.3. CVE-ID CVE-2014-6394 : Ilya Kantor
IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilties in OpenSSL Description: Multiple vulnerabilties existed in the node.js OpenSSL module prior to version 1.0.1j. CVE-ID CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568
IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: An attacker with a privileged network position may be able to inspect traffic to Xcode Server Description: Connections to Xcode Server may have been made without encryption. This issue was addressed through improved network connection logic. CVE-ID CVE-2015-5910 : an anonymous researcher
IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Build notifications may be sent to unintended recipients Description: An access issue existed in the handling of repository email lists. This issue was addressed through improved validation. CVE-ID CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of Anchorfree
subversion Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilities existed in svn versions prior to 1.7.19 Description: Multiple vulnerabilities existed in svn versions prior to 1.7.19. These issues were addressed by updating svn to version 1.7.20. CVE-ID CVE-2015-0248 CVE-2015-0251
Xcode 7.0 may be obtained from: https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
- Select Xcode in the menu bar
- Select About Xcode
- The version after applying this update will be "7.0".
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz: Upgraded. ( Security fix ) patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz: Upgraded. For more information, see: https://www.openssl.org/news/secadv_20141015.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated packages for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zc-i486-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.0.txz
Updated packages for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz
Updated packages for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zc-i486-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.1.txz
Updated packages for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz
Updated packages for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zc-i486-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.37.txz
Updated packages for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.37.txz ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz
Updated packages for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1j-i486-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.0.txz
Updated packages for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz
Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz
Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1j-x86_64-1_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz
Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1j-i486-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1j-i486-1.txz
Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1j-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1j-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 packages: 44d336a121b39296f0e6bbeeb283dd2b openssl-0.9.8zc-i486-1_slack13.0.txz 8342cfb351e59ecf5ea6d8cba66f0040 openssl-solibs-0.9.8zc-i486-1_slack13.0.txz
Slackware x86_64 13.0 packages: 671f12535bdc10ab24388b713351aca2 openssl-0.9.8zc-x86_64-1_slack13.0.txz 21e380284cdfab2fd15fffe2e0aed526 openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz
Slackware 13.1 packages: 64cb819f1e07522bd5d7ceedd0a9ab50 openssl-0.9.8zc-i486-1_slack13.1.txz 5fe4e385b2251cfd7e8ae5963ec6cef1 openssl-solibs-0.9.8zc-i486-1_slack13.1.txz
Slackware x86_64 13.1 packages: 94feb6699d6f2cc7750a6b2e17ccaaa2 openssl-0.9.8zc-x86_64-1_slack13.1.txz 2c17e4286509c29074ab0168367b851e openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz
Slackware 13.37 packages: 4483d91c776c7e23c59246c4e0aa24aa openssl-0.9.8zc-i486-1_slack13.37.txz fedd58eb19bc13c9dd88d947827a7370 openssl-solibs-0.9.8zc-i486-1_slack13.37.txz
Slackware x86_64 13.37 packages: 5d48ac1e9339efc35e304c7d48b2e762 openssl-0.9.8zc-x86_64-1_slack13.37.txz 6f5e2b576259477c13f12cbed9be8804 openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz
Slackware 14.0 packages: 2b678160283bc696565dc8bd8b28c0eb openssl-1.0.1j-i486-1_slack14.0.txz f7762615c990713e9e86d4da962f1022 openssl-solibs-1.0.1j-i486-1_slack14.0.txz
Slackware x86_64 14.0 packages: 41010ca37d49b74e7d7dc3f1c6ddc57e openssl-1.0.1j-x86_64-1_slack14.0.txz 40dc6f3de217279d6140c1efcc0d45c8 openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz
Slackware 14.1 packages: 024ecea55e22e47f9fbb4b81a7b72a51 openssl-1.0.1j-i486-1_slack14.1.txz 0a575668bb41ec4c2160800611f7f627 openssl-solibs-1.0.1j-i486-1_slack14.1.txz
Slackware x86_64 14.1 packages: d07fe289f7998a584c2b0d9810a8b9aa openssl-1.0.1j-x86_64-1_slack14.1.txz 1ffc5d0c02b0c60cefa5cf9189bfc71d openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz
Slackware -current packages: 53c9f51a79460bbfc5dec5720317cd53 a/openssl-solibs-1.0.1j-i486-1.txz cc059aa63494f3b005a886c70bc3f5d6 n/openssl-1.0.1j-i486-1.txz
Slackware x86_64 -current packages: 500709555e652adcd84b4e02dfab4eeb a/openssl-solibs-1.0.1j-x86_64-1.txz c483ca9c450fa90a901ac013276ccc53 n/openssl-1.0.1j-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the packages as root:
upgradepkg openssl-1.0.1j-i486-1_slack14.1.txz openssl-solibs-1.0.1j-i486-1_slack14.1.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
References:
CVE-2014-3513 CVE-2014-3567 SSRT101917
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP BladeSystem c-Class Onboard Administrator (OA) 4.30 and earlier.
Go to http://www.hp.com/go/oa
Select "Onboard Administrator Firmware" Select product name as ""HP BLc3000 Onboard Administrator Option" or "HP BLc7000 Onboard Administrator Option" Select the operating system from the list of choices Select Firmware version 4.40 for download Refer to the HP BladeSystem Onboard Administrator User Guide for steps to update the Onboard Administrator firmware. Implementations of OpenSSL that have been compiled with OPENSSL_NO_SRTP defined are not affected.
This issue was reported to OpenSSL on 26th September 2014, based on an original issue and patch developed by the LibreSSL project. Further analysis of the issue was performed by the OpenSSL team.
The fix was developed by the OpenSSL team.
This issue was reported to OpenSSL on 8th October 2014.
The fix was developed by Stephen Henson of the OpenSSL core team.
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 https://www.openssl.org/~bodo/ssl-poodle.pdf
Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.
This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.
The fix was developed by Akamai and the OpenSSL team.
References
URL for this Security Advisory: https://www.openssl.org/news/secadv_20141015.txt
Note: the online version of the advisory may be updated with additional details over time.
For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html
. Summary
VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues. Relevant Releases
VMware Workstation 10.x prior to version 10.0.5
VMware Player 6.x prior to version 6.0.5
VMware Fusion 7.x prior to version 7.0.1 VMware Fusion 6.x prior to version 6.0.5
vCenter Server 5.5 prior to Update 2d
ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG ESXi 5.1 without patch ESXi510-201404101-SG ESXi 5.0 without patch ESXi500-201405101-SG
- Problem Description
a. VMware ESXi, Workstation, Player, and Fusion host privilege escalation vulnerability
VMware ESXi, Workstation, Player and Fusion contain an arbitrary
file write issue. Exploitation this issue may allow for privilege
escalation on the host.
The vulnerability does not allow for privilege escalation from
the guest Operating System to the host or vice-versa. This means
that host memory can not be manipulated from the Guest Operating
System.
Mitigation
For ESXi to be affected, permissions must have been added to ESXi
(or a vCenter Server managing it) for a virtual machine
administrator role or greater.
VMware would like to thank Shanon Olsson for reporting this issue to
us through JPCERT.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8370 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any 6.0.5
ESXi 5.5 ESXi ESXi550-201403102-SG
ESXi 5.1 ESXi ESXi510-201404101-SG
ESXi 5.0 ESXi ESXi500-201405101-SG
b. VMware Workstation, Player, and Fusion Denial of Service vulnerability
VMware Workstation, Player, and Fusion contain an input validation
issue in the Host Guest File System (HGFS). This issue may allow
for a Denial of Service of the Guest Operating system.
VMware would like to thank Peter Kamensky from Digital Security for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1043 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any 7.0.1
Fusion 6.x any 6.0.5
c. VMware ESXi, Workstation, and Player Denial of Service vulnerability
VMware ESXi, Workstation, and Player contain an input
validation issue in VMware Authorization process (vmware-authd).
This issue may allow for a Denial of Service of the host. On
VMware ESXi and on Workstation running on Linux the Denial of
Service would be partial.
VMware would like to thank Dmitry Yudin @ret5et for reporting
this issue to us through HP's Zero Day Initiative.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1044 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any not affected
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi ESXi510-201410101-SG
ESXi 5.0 ESXi not affected
d.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2014-3513, CVE-2014-3567,
CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any Update 2d*
vCenter Server 5.1 any patch pending
vCenter Server 5.0 any patch pending
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
* The VMware vCenter 5.5 SSO component will be
updated in a later release
e. Update to ESXi libxml2 package
The libxml2 library is updated to version libxml2-2.7.6-17
to resolve a security issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3660 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation 10.x
https://www.vmware.com/go/downloadworkstation
VMware Player 6.x
https://www.vmware.com/go/downloadplayer
VMware Fusion 7.x and 6.x
https://www.vmware.com/go/downloadplayer
vCenter Server
Downloads and Documentation: https://www.vmware.com/go/download-vsphere
ESXi 5.5 Update 2d
File: update-from-esxi5.5-5.5_update01.zip md5sum: 5773844efc7d8e43135de46801d6ea25 sha1sum: 6518355d260e81b562c66c5016781db9f077161f http://kb.vmware.com/kb/2065832 update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG
ESXi 5.5
File: ESXi550-201501001.zip md5sum: b0f2edd9ad17d0bae5a11782aaef9304 sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1 http://kb.vmware.com/kb/2099265 ESXi550-201501001.zip contains ESXi550-201501101-SG
ESXi 5.1
File: ESXi510-201404001.zip md5sum: 9dc3c9538de4451244a2b62d247e52c4 sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66 http://kb.vmware.com/kb/2070666 ESXi510-201404001 contains ESXi510-201404101-SG
ESXi 5.0
File: ESXi500-201405001.zip md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5 http://kb.vmware.com/kb/2075521 ESXi500-201405001 contains ESXi500-201405101-SG
- Change log
2015-01-27 VMSA-2015-0001 Initial security advisory in conjunction with the release of VMware Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d and, ESXi 5.5 Patches released on 2015-01-27. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
Twitter https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201410-0371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flex system chassis management module", "scope": null, "trust": 3.3, "vendor": "ibm", "version": null }, { "model": "flex system chassis management module", "scope": "eq", "trust": 1.8, "vendor": "ibm", "version": "1.50.1" }, { "model": "flex system chassis management module 1.1.1", "scope": null, "trust": 1.2, "vendor": "ibm", "version": null }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1g" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1d" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1c" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.1e" }, { "model": "bladecenter advanced management module 3.66n", "scope": "ne", "trust": 0.9, "vendor": "ibm", "version": null }, { "model": "bladecenter advanced management module 3.66k", "scope": null, "trust": 0.9, "vendor": "ibm", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "7.0" }, { "model": "xcode", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "(os x yosemite v10.10.4 or later )" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.0.1j" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.0.1" }, { "model": "flex system chassis management module 1.50.0", "scope": null, "trust": 0.6, "vendor": "ibm", "version": null }, { "model": "global console manager", "scope": "ne", "trust": 0.6, "vendor": "ibm", "version": "1.26.1.23978" }, { "model": "global console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.4.2.15036" }, { "model": "global console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.20.20.23447" }, { "model": "flex system chassis management module", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.50.0" }, { "model": "project openssl 1.0.0a", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "local console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.2.39.0" }, { "model": "local console manager", "scope": "eq", "trust": 0.6, "vendor": "ibm", "version": "1.2.27.00" }, { "model": "local console manager", "scope": "ne", "trust": 0.6, "vendor": "ibm", "version": "1.2.40.00" }, { "model": "flex system chassis management module 1.40.1", "scope": null, "trust": 0.6, "vendor": "ibm", "version": null }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "nextscale n1200 enclosure fan power controller fhet23g-2.06", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "bladecenter advanced management module 25r5778", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "q", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1948" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.3" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.11" }, { "model": "k", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "upward integration modules scvmm add-in", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.0.3" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1" }, { "model": "project openssl 1.0.0d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "project openssl 1.0.1e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.21" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "project openssl 0.9.8u", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "project openssl 1.0.1a", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.0" }, { "model": "aspera shares", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.7.5" }, { "model": "norman shark industrial control system protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.2.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "norman shark industrial control system protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "packetshaper s-series", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "11.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.4" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "flex system chassis management module 1.20.2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "connect:enterprise secure client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "project openssl 1.0.0g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cloudsystem enterprise software", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "tivoli netcool/reporter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "proxyav", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.5" }, { "model": "insight control server provisioning", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "norman shark scada protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "netscaler t1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "project openssl 0.9.8zb", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "norman shark industrial control system protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.2" }, { "model": "j", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "project openssl 1.0.1j", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.1" }, { "model": "wb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.2.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.3" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.1.0" }, { "model": "n", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "policycenter", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "9.2" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "project openssl 1.0.0o", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "pa", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "m210", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "vsr1000", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.2" }, { "model": "project openssl 0.9.8w", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "flex system ib6131 40gb infiniband switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4" }, { "model": "bladesystem c-class onboard administrator", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "4.40" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5.2" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.0" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "119000" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.2" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.4" }, { "model": "x-series xos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "10.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.11" }, { "model": "project openssl 1.0.0m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sterling connect:express for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11150-11" }, { "model": "norman shark network protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.0" }, { "model": "nextscale n1200 enclosure fan power controller fhet21c-2.04", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "sterling connect:enterprise for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.4" }, { "model": "project openssl 1.0.1g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "project openssl 0.9.8m", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "norman shark scada protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.2.3" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "megaraid storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "15.03.01.00" }, { "model": "command center appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "aspera shares", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.0.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8720" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.23" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.2" }, { "model": "tivoli netcool/system service monitor fp11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.2.1" }, { "model": "sterling file gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.4" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.22" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "project openssl 1.0.1i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70000" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.2" }, { "model": "r2122", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7900" }, { "model": "flex system chassis management module 1.40.2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli netcool/system service monitor fp12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "project openssl 1.0.0h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "tivoli provisioning manager for os deployment", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.1" }, { "model": "infosphere master data management patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "netcool/system service monitor fp1 p14", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0-" }, { "model": "flex system en6131 40gb ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.4" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.0.0" }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.1" }, { "model": "flex system ib6131 40gb infiniband switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.4.1110" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.3" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "policycenter", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "9.2.10" }, { "model": "netcool/system service monitor fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8886" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.10" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "office connect ps1810", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "qradar siem mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "aura communication manager ssp04", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2" }, { "model": "ex series network switches for ibm products pre 12.3r9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "project openssl 0.9.8r", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.7" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.0" }, { "model": "aspera faspex", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.0.3" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "m.10", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "project openssl 0.9.8n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "connect:enterprise command line client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "virtual connect enterprise manager sdk", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79000" }, { "model": "malware analyzer g2", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.5" }, { "model": "aspera proxy", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "1.2.3" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "proxyav", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.4" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "project openssl 0.9.8y", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "bcaaa", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1" }, { "model": "aspera mobile", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "upward integration modules for microsoft system center", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "project openssl beta4", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "h.10", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "upward integration modules hardware management pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.2" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "project openssl 1.0.0l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.20" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "upward integration modules integrated installer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2" }, { "model": "general parallel file system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.0" }, { "model": "norman shark scada protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.2" }, { "model": "project openssl beta5", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "tivoli netcool/system service monitor fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7967" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.1.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.0" }, { "model": "aspera drive", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "infosphere master data management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.3" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.9" }, { "model": "content analysis system", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.2" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.53" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.4" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.3" }, { "model": "project openssl 0.9.8p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "flex system chassis management module 1.20.1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "security analytics platform", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.6.10" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "norman shark scada protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.3.2" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "12500(comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "v7)0" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8852" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8750" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "57000" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5.0" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "aspera console", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "2.3.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.1" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5" }, { "model": "r", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.2" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "norman shark network protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.2" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.0.1" }, { "model": "esxi esxi550-20150110", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "kb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.8.0" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129000" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "nextscale n1200 enclosure fan power controller fhet24d-2.08", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.6" }, { "model": "i.10", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.2" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "project openssl 0.9.8za", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "7.0" }, { "model": "m.08", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.1" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "ssl visibility", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.8" }, { "model": "project openssl 0.9.8q", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sterling connect:express for unix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.3" }, { "model": "sterling connect:express for unix ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.5.0.11150-11" }, { "model": "systems insight manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "infosphere master data management provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.0" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-493" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.2" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.8" }, { "model": "ssl visibility 3.8.2f", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": null }, { "model": "rational application developer for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.1" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.0.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.6" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.6" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.3.6" }, { "model": "rational software architect realtime edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.3" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-453" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0" }, { "model": "director", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.1.16.1" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.3" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.3" }, { "model": "sterling connect:express for unix ifix", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.4.6.1146-109" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "tivoli netcool/system service monitor fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5" }, { "model": "project openssl 1.0.1c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.4" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-467" }, { "model": "vb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1881" }, { "model": "connect:enterprise secure client", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56001" }, { "model": "ka", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "security analytics platform", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "7.1.6" }, { "model": "office connect pk", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v5000-" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "nextscale n1200 enclosure fan power controller fhet21e-2.05", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aspera proxy", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.2.2" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8v" }, { "model": "norman shark network protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.3.2" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl 1.0.1f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "yb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "aspera connect server", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.1" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.0.2" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.4.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.1" }, { "model": "flex system chassis management module 1.40.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli provisioning manager for images", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.0" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1" }, { "model": "upward integration modules scvmm add-in", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.5" }, { "model": "project openssl 0.9.8g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "bcaaa", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.5" }, { "model": "nextscale n1200 enclosure fan power controller fhet24b-2.07", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "flex system fc3171 8gb san switch and san pass-thru", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.5.03.00" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.41" }, { "model": "aspera ondemand for google cloud", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.2.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.21" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.0" }, { "model": "aura utility services sp7", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "sterling file gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.5.2" }, { "model": "aspera console", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "2.5.3" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.63" }, { "model": "e", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.20" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "tivoli workload scheduler for applications fp02", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.2" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7779" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "upward integration modules for vmware vsphere", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.5.3" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.2" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.10" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.20" }, { "model": "splunk", "scope": "ne", "trust": 0.3, "vendor": "splunk", "version": "5.0.11" }, { "model": "tivoli netcool/system service monitor fp13", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "aspera faspex", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.9" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.40" }, { "model": "msr2000 r0106p18", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "va", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.32" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aspera ondemand for softlayer", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.4" }, { "model": "tivoli netcool/system service monitor fp6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.4" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "aspera ondemand for azure", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "r2311p05", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5700" }, { "model": "aspera shares", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "1.9" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0" }, { "model": "qradar risk manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.46.4.2.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "aspera connect server", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "aspera client", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "project openssl 0.9.8l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "version control repository manager 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "flex system fc3171 8gb san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.4" }, { "model": "aspera outlook plugin", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.4.2" }, { "model": "project openssl 0.9.8zc", "scope": "ne", "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.01" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "system management homepage 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.0" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1.131" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.5" }, { "model": "image construction and composition tool", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "ssl visibility", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "3.7" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.3.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.2" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.2.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.1" }, { "model": "project openssl 1.0.0i", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56003" }, { "model": "sterling connect:enterprise http option", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.0.0" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "malware analysis appliance", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.2.0" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.3" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.2" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "tivoli workload scheduler for applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2" }, { "model": "flex system chassis management module 1.20.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.2" }, { "model": "sterling connect:express for unix ifix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.6.1146-108" }, { "model": "aspera enterprise server", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.1" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5.0" }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.0" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "project openssl 1.0.0e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "packetshaper", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "9.2.10" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.5" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.1.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "aspera shares", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "1.7.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1.2" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8x" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "cloudsystem foundation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.3.2" }, { "model": "ps110", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "upward integration modules hardware management pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "aspera point to point", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.33" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "packetshaper s-series", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "11.2" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.3.0" }, { "model": "upward integration modules integrated installer", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3" }, { "model": "project openssl 0.9.8t", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "splunk", "scope": "ne", "trust": 0.3, "vendor": "splunk", "version": "6.0.7" }, { "model": "tivoli netcool/system service monitor fp8", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.1.0" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "flex system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70000" }, { "model": "security network intrusion prevention system gx5108-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "imc uam e0302p07", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.6" }, { "model": "secure global desktop", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "4.71" }, { "model": "switch series (comware", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10500v7)0" }, { "model": "aspera faspex", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.7.5" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2.1" }, { "model": "project openssl 1.0.0c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.0" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "qradar vulnerability manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.0" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.0" }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "san volume controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.3" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.1.0" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "ra", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "tuxedo", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.1.0" }, { "model": "proxysg sgos", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "6.5.6.1" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "rf manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.9.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.6.0" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "security network intrusion prevention system gx7412-05", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "project openssl 1.0.0f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "tivoli management framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "pureapplication system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "packetshaper s-series", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "11.1" }, { "model": "h.07", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "infosphere master data management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.3" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.1" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "tivoli netcool/system service monitor fp4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "ssl for openvms", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.4-495" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.5" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "cognos insight", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.2.2" }, { "model": "office connect pm", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "project openssl 1.0.0j", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "project openssl 1.0.0b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "content analysis system", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1" }, { "model": "ya", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "switch series r2311p05", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5900" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "bladecenter t advanced management module 32r0835", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.26.2.1.2" }, { "model": "bladesystem c-class onboard administrator", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.30" }, { "model": "cloudsystem enterprise software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3.0" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.0" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.80" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-471" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "2.2" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "initiate master data service provider hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5" }, { "model": "12500(comware r7328p04", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "v7)" }, { "model": "aura presence services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aspera console", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "2.0.1" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "tivoli netcool/system service monitor fp9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.4" }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.5" }, { "model": "w", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "content analysis system software", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "1.1.1.1" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.8.1.0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.7.0" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.2" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8730" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "cloudbridge", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "tivoli netcool/system service monitor fp5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "version control repository manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "pb", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "nextscale n1200 enclosure fan power controller fhet13a-2.00", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "tivoli workload scheduler for applications fp01", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.56.5.1.0" }, { "model": "initiate master data service patient hub", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "flex system chassis management module 1.1.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "upward integration modules for microsoft system center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5" }, { "model": "project openssl 1.0.1d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.9" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7989" }, { "model": "rational software architect", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.10" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8740" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.4" }, { "model": "cacheflow", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "2.0" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aspera console", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "2.3" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "security network intrusion prevention system gx3002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "aspera faspex", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "3.7.7" }, { "model": "xcode", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "switch series r2111p06", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "11900" }, { "model": "imc uam", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.5" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "packetshaper", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "9.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "aspera orchestrator", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "2.10" }, { "model": "flex system fc3171 8gb san switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.5.1.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.3" }, { "model": "project openssl 1.0.0n", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "insight control server provisioning 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "insight control server provisioning", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.4.0" }, { "model": "sterling connect:enterprise http option", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4" }, { "model": "ei switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51300" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "y", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59200" }, { "model": "u", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "insight control", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.4.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.3.1" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.4.34" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "flex system chassis management module 2.5.3t", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "l", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3500-" }, { "model": "server migration pack", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "security network intrusion prevention system gx5008-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "m220", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56002" }, { "model": "project openssl 1.0.0h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "insight control", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.5" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "initiate master data service", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "flex system chassis management module 1.0.0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tivoli netcool/system service monitor fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "imc wsm", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2.1" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aspera ondemand for amazon", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "msm", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.36.3.1.0" }, { "model": "sdk for node.js", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.9" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "version control agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.1" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "project openssl 0.9.8o", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "sdk for node.js", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.2" }, { "model": "server migration pack", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1886" }, { "model": "project openssl 1.0.1b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "project openssl 1.0.0k", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "storwize", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v3700-" }, { "model": "switch series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59000" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.4" }, { "model": "matrix operating environment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "security network intrusion prevention system gx7412", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "storwize unified", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "v70001.3.0.5" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "msr2000", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "director", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "tivoli netcool/system service monitor fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "qradar siem", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2.3" }, { "model": "security network intrusion prevention system gx5208-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "tivoli netcool/system service monitor fp7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.0" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "sterling b2b integrator", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8677" }, { "model": "nextscale n1200 enclosure fan power controller fhet17a-2.02", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.2" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.2" }, { "model": "systems director common agent for linux", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2" }, { "model": "tivoli composite application manager for transactions", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "malware analyzer g2", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "4.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.2.1" }, { "model": "f", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "nextscale n1200 enclosure fan power controller fhet24j-2.10", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "aspera enterprise server", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.2" }, { "model": "project openssl 0.9.8s", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "security network intrusion prevention system gx4002", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "security network intrusion prevention system gx5208", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "qradar risk manager mr2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "security network intrusion prevention system gx5108", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.2" }, { "model": "security network intrusion prevention system gx7412-10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "proxysg sgos", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "6.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "switch series r1005p15", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "12900" }, { "model": "systems director storage control", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "office connect p", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "6.0.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "aspera orchestrator", "scope": "eq", "trust": 0.3, "vendor": "asperasoft", "version": "0" }, { "model": "norman shark industrial control system protection", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "5.0" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "norman shark network protection", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "5.2.3" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "0" }, { "model": "tivoli provisioning manager for os deployment", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "oneview", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "1.20" }, { "model": "matrix operating environment", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.5.1" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.1" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.10" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "infosphere master data management", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.4" }, { "model": "nextscale n1200 enclosure fan power controller fhet24g-2.09", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "manager for sle sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "111.7" }, { "model": "studio onsite", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.3" }, { "model": "security network intrusion prevention system gx4004-v2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6.1" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "cloudsystem matrix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.2" }, { "model": "campaign", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.8" }, { "model": "cloudsystem foundation", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "8.1.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.7" }, { "model": "systems director", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.0.0" }, { "model": "insight control server deployment", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2.2" }, { "model": "security network intrusion prevention system gx5008", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.0" }, { "model": "office connect pl", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "18100" }, { "model": "content analysis system", "scope": "ne", "trust": 0.3, "vendor": "bluecoat", "version": "1.2.3.1" }, { "model": "security network intrusion prevention system gx6116", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.6" }, { "model": "reporter\u0027s iso", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "9.4" }, { "model": "splunk", "scope": "eq", "trust": 0.3, "vendor": "splunk", "version": "5.0.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.0" }, { "model": "oneview", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.05" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "systems insight manager 7.4.0a", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "t", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security network intrusion prevention system gx7800", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.4" }, { "model": "upward integration modules for vmware vsphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.1" }, { "model": "security network intrusion prevention system gx4004", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "vsr1000 r0204p01", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.4" }, { "model": "version control repository manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3.4" }, { "model": "storage provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.3" }, { "model": "flex system en6131 40gb ethernet switch", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.4.1110" }, { "model": "security virtual server protection for vmware", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "ssl for openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.4-476" }, { "model": "switch series r2311p05", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5920" }, { "model": "aspera point to point", "scope": "ne", "trust": 0.3, "vendor": "asperasoft", "version": "3.5.2" }, { "model": "insight control server provisioning", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.4.1" }, { "model": "tivoli provisioning manager for images system edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x7.1.1.0" }, { "model": "systems director common agent for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.1" }, { "model": "security analytics platform", "scope": "eq", "trust": 0.3, "vendor": "bluecoat", "version": "7.1" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "contactoptimization", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "project openssl 1.0.1h", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.1" }, { "model": "ei switch series r3108p03", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "5130" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" } ], "sources": [ { "db": "BID", "id": "70586" }, { "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "db": "NVD", "id": "CVE-2014-3513" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:openssl:openssl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:xcode", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004939" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132467" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "PACKETSTORM", "id": "131254" } ], "trust": 0.6 }, "cve": "CVE-2014-3513", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2014-3513", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-3513", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-3513", "trust": 0.8, "value": "High" }, { "author": "VULMON", "id": "CVE-2014-3513", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3513" }, { "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "db": "NVD", "id": "CVE-2014-3513" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message. OpenSSL is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to crash the affected application, denying service to legitimate users. \nOpenSSL prior to 0.9.8zc, 1.0.0o, and 1.0.1j are vulnerable. ============================================================================\nUbuntu Security Notice USN-2385-1\nOctober 16, 2014\n\nopenssl vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in OpenSSL. \nThis issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n libssl1.0.0 1.0.1f-1ubuntu2.7\n\nUbuntu 12.04 LTS:\n libssl1.0.0 1.0.1-4ubuntu5.20\n\nUbuntu 10.04 LTS:\n libssl0.9.8 0.9.8k-7ubuntu8.22\n\nAfter a standard system update you need to reboot your computer to make all\nthe necessary changes. \n\nRelease Date: 2015-04-01\nLast Updated: 2015-04-01\n\nPotential Security Impact: Remote disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH), HP Smart Update Manager (SUM), and HP Version\nControl Agent (VCA) which are components of HP Insight Control server\ndeployment. These vulnerabilities are related to the SSLv3 vulnerability\nknown as \"Padding Oracle on Downgraded Legacy Encryption\" or \"POODLE\". The\ncomponents of HP Insight Control server deployment could be exploited\nremotely to allow disclosure of information. \n\nHP Insight Control server deployment includes HP System Management Homepage\n(SMH), HP Version Control Agent (VCA), and HP Smart Update Manager (SUM) and\ndeploys them through the following jobs. This bulletin provides the\ninformation needed to update the vulnerable components in HP Insight Control\nserver deployment. \n\nInstall HP Management Agents for Windows x86/x64\nInstall HP Management Agents for RHEL 5 x64\nInstall HP Management Agents for RHEL 6 x64\nInstall HP Management Agents for SLES 10 x64\nInstall HP Management Agents for SLES 11 x64\nUpgrade Proliant Firmware\n\nReferences:\n\nCVE-2014-3508\nCVE-2014-3509\nCVE-2014-3511\nCVE-2014-3513\nCVE-2014-3566\nCVE-2014-3567\nCVE-2014-3568\nCVE-2014-5139\nSSRT102004\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Insight Control server deployment v7.1.2, v7.2.0, v7.2.1, v7.2.2, v7.3.1\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-3508 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2014-3509 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2014-3511 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2014-3513 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1\nCVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2014-3567 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1\nCVE-2014-3568 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2014-5139 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following instructions to resolve this vulnerability. \n\nNote: For HP Insight deployment Control server v7.1.2, v7.2.0, v7.2.1 and\nv7.2.2, you must upgrade to v7.3.1 and follow the steps from 1 to 11\nmentioned below to resolve the vulnerability. \n\nDelete the files smh*.exe from Component Copy Location listed in the\nfollowing table, rows 1 and 2. \nDelete the files vca*.exe/vcaamd64-*.exe from Component Copy Location listed\nin the following table, rows 3 and 4. \nDelete the files hpsmh-7.*.rpm\" from Component Copy Location listed in row 5. \nIn sequence, perform the steps from left to right in the following table. \nFirst, download components from Download Link; Second, rename the component\nas suggested in Rename to. Third, copy the component to the location\nspecified in Component Copy Location. \nTable Row Number\n Download Link\n Rename to\n Component Copy Location\n\n1\n http://www.hp.com/swpublishing/MTX-bd2042a1c7574aad90c4839efe\n smhamd64-cp023964.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n2\n http://www.hp.com/swpublishing/MTX-062078f1ae354b7e99c86c151c\n smhx86-cp023963.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n3\n http://www.hp.com/swpublishing/MTX-7b23e47d5d9b420b94bd1323eb\n vcax86 cp025295.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n4\n http://www.hp.com/swpublishing/MTX-2557aa7dc1654cf6b547c1a9e4\n vcaamd64-cp025296.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2008\n\n5\n http://www.hp.com/swpublishing/MTX-5827037475e44abab586463723\n Do not rename the downloaded component for this step. \n \\\\express\\hpfeatures\\hpagents-sles11-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-sles10-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel5-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel6-x64\\components\n\n6\n http://www.hp.com/swpublishing/MTX-57ab6bb78b6e47a18718f44133\n Do not rename the downloaded component for this step. \n \\\\express\\hpfeatures\\hpagents-sles11-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-sles10-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel5-x64\\components\n\n\\\\express\\hpfeatures\\hpagents-rhel6-x64\\components\n\n7\n http://www.hp.com/swpublishing/MTX-34bcab41ac7e4db299e3f5f2f1\n smhx86-cp025274.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2003\n\n8\n http://www.hp.com/swpublishing/MTX-00eb9ac82e86449e8c3ba101bd\n smhamd64-cp025275.exe\n \\\\express\\hpfeatures\\hpagents-ws\\components\\Win2003\n\nDownload and extract the HP SUM component from\nftp://ftp.hp.com/pub/softlib2/software1/pubsw-windows/p991570621/v99346\n\nCopy all content from extracted folder and paste at\n\\\\eXpress\\hpfeatures\\fw-proLiant\\components\nInitiate Install HP Management Agents for SLES 11 x64 on the target running\nSLES11 x64. \nInitiate Install HP Management Agents for SLES 10 x64 on the target running\nSLES10 x64. \nInitiate Install HP Management Agents for RHEL 6 x64 on the target running\nRHEL 6 x64. \nInitiate Install HP Management Agents for RHEL 5 x64 on the target running\nRHEL 5 x64. \nInitiate Install HP Management Agents for Windows x86/x64 job on the target\nrunning Windows. \n\nHISTORY\nVersion:1 (rev.1) - 1 April 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: openssl security update\nAdvisory ID: RHSA-2014:1652-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1652.html\nIssue date: 2014-10-16\nCVE Names: CVE-2014-3513 CVE-2014-3567 \n=====================================================================\n\n1. Summary:\n\nUpdated openssl packages that contain a backported patch to mitigate the\nCVE-2014-3566 issue and fix two security issues are now available for Red\nHat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),\nTransport Layer Security (TLS), and Datagram Transport Layer Security\n(DTLS) protocols, as well as a full-strength, general purpose cryptography\nlibrary. \n\nThis update adds support for the TLS Fallback Signaling Cipher Suite Value\n(TLS_FALLBACK_SCSV), which can be used to prevent protocol downgrade\nattacks against applications which re-connect using a lower SSL/TLS\nprotocol version when the initial connection indicating the highest\nsupported protocol version fails. \n\nThis can prevent a forceful downgrade of the communication to SSL 3.0. \nThe SSL 3.0 protocol was found to be vulnerable to the padding oracle\nattack when using block cipher suites in cipher block chaining (CBC) mode. \nThis issue is identified as CVE-2014-3566, and also known under the alias\nPOODLE. This SSL 3.0 protocol flaw will not be addressed in a future\nupdate; it is recommended that users configure their applications to\nrequire at least TLS protocol version 1.0 for secure communication. \n\nFor additional information about this flaw, see the Knowledgebase article\nat https://access.redhat.com/articles/1232123\n\nA memory leak flaw was found in the way OpenSSL parsed the DTLS Secure\nReal-time Transport Protocol (SRTP) extension data. (CVE-2014-3513)\n\nA memory leak flaw was found in the way an OpenSSL handled failed session\nticket integrity checks. A remote attacker could exhaust all available\nmemory of an SSL/TLS or DTLS server by sending a large number of invalid\nsession tickets to that server. (CVE-2014-3567)\n\nAll OpenSSL users are advised to upgrade to these updated packages, which\ncontain backported patches to mitigate the CVE-2014-3566 issue and correct\nthe CVE-2014-3513 and CVE-2014-3567 issues. For the update to take effect,\nall services linked to the OpenSSL library (such as httpd and other\nSSL-enabled services) must be restarted or the system rebooted. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\n\nppc64:\nopenssl-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.ppc.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.s390.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nppc64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.ppc64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.s390x.rpm\nopenssl-static-1.0.1e-30.el6_6.2.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssl-1.0.1e-30.el6_6.2.src.rpm\n\ni386:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.i686.rpm\nopenssl-static-1.0.1e-30.el6_6.2.i686.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm\nopenssl-static-1.0.1e-30.el6_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nppc64:\nopenssl-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.ppc64.rpm\n\ns390x:\nopenssl-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.s390x.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.ppc64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.ppc.rpm\nopenssl-static-1.0.1e-34.el7_0.6.ppc64.rpm\n\ns390x:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.s390x.rpm\nopenssl-static-1.0.1e-34.el7_0.6.s390.rpm\nopenssl-static-1.0.1e-34.el7_0.6.s390x.rpm\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nopenssl-1.0.1e-34.el7_0.6.src.rpm\n\nx86_64:\nopenssl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nopenssl-debuginfo-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-debuginfo-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm\nopenssl-static-1.0.1e-34.el7_0.6.i686.rpm\nopenssl-static-1.0.1e-34.el7_0.6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-3513.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-3567.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/articles/1232123\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUP940XlSAg2UNWIIRAhUYAJ4or1rZ25E0BXjTPyeDsN+keTz3twCdHDEz\nqY686VXQQ02SLq5vTvKfuHk=\n=McEc\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \nCorrected: 2014-10-15 19:59:43 UTC (stable/10, 10.1-PRERELEASE)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC3)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC2-p1)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-RC1-p1)\n 2014-10-21 19:00:32 UTC (releng/10.1, 10.1-BETA3-p1)\n 2014-10-21 20:21:10 UTC (releng/10.0, 10.0-RELEASE-p10)\n 2014-10-15 20:28:31 UTC (stable/9, 9.3-STABLE)\n 2014-10-21 20:21:10 UTC (releng/9.3, 9.3-RELEASE-p3)\n 2014-10-21 20:21:10 UTC (releng/9.2, 9.2-RELEASE-p13)\n 2014-10-21 20:21:10 UTC (releng/9.1, 9.1-RELEASE-p20)\n 2014-10-15 20:28:31 UTC (stable/8, 8.4-STABLE)\n 2014-10-21 20:21:27 UTC (releng/8.4, 8.4-RELEASE-p17)\nCVE Name: CVE-2014-3513, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:http://security.FreeBSD.org/\u003e. Background\n\nFreeBSD includes software from the OpenSSL Project. \n\nII. [CVE-2014-3513]. [CVE-2014-3567]. This\nprotocol weakness makes it possible for an attacker to obtain clear text\ndata through a padding-oracle attack. \n\nSome client applications (such as browsers) will reconnect using a\ndowngraded protocol to work around interoperability bugs in older\nservers. This could be exploited by an active man-in-the-middle to\ndowngrade connections to SSL 3.0 even if both sides of the connection\nsupport higher protocols. SSL 3.0 contains a number of weaknesses\nincluding POODLE [CVE-2014-3566]. \n\nOpenSSL has added support for TLS_FALLBACK_SCSV to allow applications\nto block the ability for a MITM attacker to force a protocol downgrade. \n\nWhen OpenSSL is configured with \"no-ssl3\" as a build option, servers\ncould accept and complete a SSL 3.0 handshake, and clients could be\nconfigured to send them. [CVE-2014-3568]. \n\nIII. \n[CVE-2014-3567]. \n\nAn active man-in-the-middle attacker can force a protocol downgrade\nto SSLv3 and exploit the weakness of SSLv3 to obtain clear text data\nfrom the connection. [CVE-2014-3566] [CVE-2014-3568]\n\nIV. Workaround\n\nNo workaround is available. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.0]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-10.0.patch.asc\n# gpg --verify openssl-10.0.patch.asc\n\n[FreeBSD 9.3]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-9.3.patch.asc\n# gpg --verify openssl-9.3.patch.asc\n\n[FreeBSD 8.4, 9.1 and 9.2]\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch\n# fetch http://security.FreeBSD.org/patches/SA-14:23/openssl-8.4.patch.asc\n# gpg --verify openssl-8.4.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:http://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart all deamons using the library, or reboot the system. \n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/8/ r273151\nreleng/8.4/ r273416\nstable/9/ r273151\nreleng/9.1/ r273415\nreleng/9.2/ r273415\nreleng/9.3/ r273415\nstable/10/ r273149\nreleng/10.0/ r273415\nreleng/10.1/ r273399\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:http://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-09-16-2 Xcode 7.0\n\nXcode 7.0 is now available and addresses the following:\n\nDevTools\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: An attacker may be able to bypass access restrictions\nDescription: An API issue existed in the apache configuration. This\nissue was addressed by updating header files to use the latest\nversion. \nCVE-ID\nCVE-2015-3185 : Branko Aibej of the Apache Software Foundation\n\nIDE Xcode Server\nAvailable for: OS X Yosemite 10.10 or later\nImpact: An attacker may be able to access restricted parts of the\nfilesystem\nDescription: A comparison issue existed in the node.js send module\nprior to version 0.8.4. This issue was addressed by upgrading to\nversion 0.12.3. \nCVE-ID\nCVE-2014-6394 : Ilya Kantor\n\nIDE Xcode Server\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: Multiple vulnerabilties in OpenSSL\nDescription: Multiple vulnerabilties existed in the node.js OpenSSL\nmodule prior to version 1.0.1j. \nCVE-ID\nCVE-2014-3513\nCVE-2014-3566\nCVE-2014-3567\nCVE-2014-3568\n\nIDE Xcode Server\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: An attacker with a privileged network position may be able\nto inspect traffic to Xcode Server\nDescription: Connections to Xcode Server may have been made without\nencryption. This issue was addressed through improved network\nconnection logic. \nCVE-ID\nCVE-2015-5910 : an anonymous researcher\n\nIDE Xcode Server\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: Build notifications may be sent to unintended recipients\nDescription: An access issue existed in the handling of repository\nemail lists. This issue was addressed through improved validation. \nCVE-ID\nCVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of\nAnchorfree\n\nsubversion\nAvailable for: OS X Yosemite v10.10.4 or later\nImpact: Multiple vulnerabilities existed in svn versions prior to\n1.7.19\nDescription: Multiple vulnerabilities existed in svn versions prior\nto 1.7.19. These issues were addressed by updating svn to version\n1.7.20. \nCVE-ID\nCVE-2015-0248\nCVE-2015-0251\n\n\nXcode 7.0 may be obtained from:\nhttps://developer.apple.com/xcode/downloads/\n\nTo check that the Xcode has been updated:\n\n* Select Xcode in the menu bar\n* Select About Xcode\n* The version after applying this update will be \"7.0\". \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz: Upgraded. \n (* Security fix *)\npatches/packages/openssl-1.0.1j-i486-1_slack14.1.txz: Upgraded. \n For more information, see:\n https://www.openssl.org/news/secadv_20141015.txt\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-0.9.8zc-i486-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.0.txz\n\nUpdated packages for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz\n\nUpdated packages for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-0.9.8zc-i486-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.1.txz\n\nUpdated packages for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz\n\nUpdated packages for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-0.9.8zc-i486-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/openssl-solibs-0.9.8zc-i486-1_slack13.37.txz\n\nUpdated packages for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-0.9.8zc-x86_64-1_slack13.37.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz\n\nUpdated packages for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1j-i486-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.0.txz\n\nUpdated packages for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz\n\nUpdated packages for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1j-i486-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\nUpdated packages for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1j-x86_64-1_slack14.1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1j-i486-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1j-i486-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1j-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1j-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 packages:\n44d336a121b39296f0e6bbeeb283dd2b openssl-0.9.8zc-i486-1_slack13.0.txz\n8342cfb351e59ecf5ea6d8cba66f0040 openssl-solibs-0.9.8zc-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 packages:\n671f12535bdc10ab24388b713351aca2 openssl-0.9.8zc-x86_64-1_slack13.0.txz\n21e380284cdfab2fd15fffe2e0aed526 openssl-solibs-0.9.8zc-x86_64-1_slack13.0.txz\n\nSlackware 13.1 packages:\n64cb819f1e07522bd5d7ceedd0a9ab50 openssl-0.9.8zc-i486-1_slack13.1.txz\n5fe4e385b2251cfd7e8ae5963ec6cef1 openssl-solibs-0.9.8zc-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 packages:\n94feb6699d6f2cc7750a6b2e17ccaaa2 openssl-0.9.8zc-x86_64-1_slack13.1.txz\n2c17e4286509c29074ab0168367b851e openssl-solibs-0.9.8zc-x86_64-1_slack13.1.txz\n\nSlackware 13.37 packages:\n4483d91c776c7e23c59246c4e0aa24aa openssl-0.9.8zc-i486-1_slack13.37.txz\nfedd58eb19bc13c9dd88d947827a7370 openssl-solibs-0.9.8zc-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 packages:\n5d48ac1e9339efc35e304c7d48b2e762 openssl-0.9.8zc-x86_64-1_slack13.37.txz\n6f5e2b576259477c13f12cbed9be8804 openssl-solibs-0.9.8zc-x86_64-1_slack13.37.txz\n\nSlackware 14.0 packages:\n2b678160283bc696565dc8bd8b28c0eb openssl-1.0.1j-i486-1_slack14.0.txz\nf7762615c990713e9e86d4da962f1022 openssl-solibs-1.0.1j-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 packages:\n41010ca37d49b74e7d7dc3f1c6ddc57e openssl-1.0.1j-x86_64-1_slack14.0.txz\n40dc6f3de217279d6140c1efcc0d45c8 openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz\n\nSlackware 14.1 packages:\n024ecea55e22e47f9fbb4b81a7b72a51 openssl-1.0.1j-i486-1_slack14.1.txz\n0a575668bb41ec4c2160800611f7f627 openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 packages:\nd07fe289f7998a584c2b0d9810a8b9aa openssl-1.0.1j-x86_64-1_slack14.1.txz\n1ffc5d0c02b0c60cefa5cf9189bfc71d openssl-solibs-1.0.1j-x86_64-1_slack14.1.txz\n\nSlackware -current packages:\n53c9f51a79460bbfc5dec5720317cd53 a/openssl-solibs-1.0.1j-i486-1.txz\ncc059aa63494f3b005a886c70bc3f5d6 n/openssl-1.0.1j-i486-1.txz\n\nSlackware x86_64 -current packages:\n500709555e652adcd84b4e02dfab4eeb a/openssl-solibs-1.0.1j-x86_64-1.txz\nc483ca9c450fa90a901ac013276ccc53 n/openssl-1.0.1j-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.1j-i486-1_slack14.1.txz openssl-solibs-1.0.1j-i486-1_slack14.1.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n\nReferences:\n\nCVE-2014-3513\nCVE-2014-3567\nSSRT101917\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP BladeSystem c-Class Onboard Administrator (OA) 4.30 and earlier. \n\nGo to\nhttp://www.hp.com/go/oa\n\nSelect \"Onboard Administrator Firmware\"\nSelect product name as \"\"HP BLc3000 Onboard Administrator Option\" or \"HP\nBLc7000 Onboard Administrator Option\"\nSelect the operating system from the list of choices\nSelect Firmware version 4.40 for download\nRefer to the HP BladeSystem Onboard Administrator User Guide for steps to\nupdate the Onboard Administrator firmware. Implementations of OpenSSL that\nhave been compiled with OPENSSL_NO_SRTP defined are not affected. \n\nThis issue was reported to OpenSSL on 26th September 2014, based on an original\nissue and patch developed by the LibreSSL project. Further analysis of the issue\nwas performed by the OpenSSL team. \n\nThe fix was developed by the OpenSSL team. \n\nThis issue was reported to OpenSSL on 8th October 2014. \n\nThe fix was developed by Stephen Henson of the OpenSSL core team. \n\nhttps://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00\nhttps://www.openssl.org/~bodo/ssl-poodle.pdf\n\nSupport for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller. \n\nThis issue was reported to OpenSSL by Akamai Technologies on 14th October 2014. \n\nThe fix was developed by Akamai and the OpenSSL team. \n\n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv_20141015.txt\n\nNote: the online version of the advisory may be updated with additional\ndetails over time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/about/secpolicy.html\n\n. Summary\n\n VMware vCenter Server, ESXi, Workstation, Player and Fusion address\n several security issues. Relevant Releases\n\n VMware Workstation 10.x prior to version 10.0.5\n \n VMware Player 6.x prior to version 6.0.5\n\n VMware Fusion 7.x prior to version 7.0.1\n VMware Fusion 6.x prior to version 6.0.5\n\n vCenter Server 5.5 prior to Update 2d\n\n ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG\n ESXi 5.1 without patch ESXi510-201404101-SG\n ESXi 5.0 without patch ESXi500-201405101-SG\n\n3. Problem Description \n\n a. VMware ESXi, Workstation, Player, and Fusion host privilege\n escalation vulnerability\n\n VMware ESXi, Workstation, Player and Fusion contain an arbitrary \n file write issue. Exploitation this issue may allow for privilege\n escalation on the host. \n\n The vulnerability does not allow for privilege escalation from \n the guest Operating System to the host or vice-versa. This means\n that host memory can not be manipulated from the Guest Operating\n System. \n\n Mitigation\n \n For ESXi to be affected, permissions must have been added to ESXi\n (or a vCenter Server managing it) for a virtual machine \n administrator role or greater. \n\n VMware would like to thank Shanon Olsson for reporting this issue to\n us through JPCERT. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2014-8370 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any not affected\n Fusion 6.x any 6.0.5\n\n ESXi 5.5 ESXi ESXi550-201403102-SG\n ESXi 5.1 ESXi ESXi510-201404101-SG \n ESXi 5.0 ESXi ESXi500-201405101-SG\n\n b. VMware Workstation, Player, and Fusion Denial of Service \n vulnerability\n\n VMware Workstation, Player, and Fusion contain an input validation \n issue in the Host Guest File System (HGFS). This issue may allow\n for a Denial of Service of the Guest Operating system. \n\n VMware would like to thank Peter Kamensky from Digital Security for \n reporting this issue to us. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2015-1043 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any 7.0.1\n Fusion 6.x any 6.0.5\n\n c. VMware ESXi, Workstation, and Player Denial of Service \n vulnerability\n\n VMware ESXi, Workstation, and Player contain an input\n validation issue in VMware Authorization process (vmware-authd). \n This issue may allow for a Denial of Service of the host. On \n VMware ESXi and on Workstation running on Linux the Denial of\n Service would be partial. \n\n VMware would like to thank Dmitry Yudin @ret5et for reporting\n this issue to us through HP\u0027s Zero Day Initiative. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2015-1044 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any not affected\n Fusion 6.x any not affected\n\n ESXi 5.5 ESXi ESXi550-201501101-SG\n ESXi 5.1 ESXi ESXi510-201410101-SG\n ESXi 5.0 ESXi not affected\n\n d. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2014-3513, CVE-2014-3567, \n CVE-2014-3566 (\"POODLE\") and CVE-2014-3568 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n vCenter Server 5.5 any Update 2d*\n vCenter Server 5.1 any patch pending\n vCenter Server 5.0 any patch pending\n\n ESXi 5.5 ESXi ESXi550-201501101-SG \n ESXi 5.1 ESXi patch pending\n ESXi 5.0 ESXi patch pending\n\n * The VMware vCenter 5.5 SSO component will be \n updated in a later release\n \n e. Update to ESXi libxml2 package\n\n The libxml2 library is updated to version libxml2-2.7.6-17\n to resolve a security issue. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2014-3660 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n ESXi 5.5 ESXi ESXi550-201501101-SG \n ESXi 5.1 ESXi patch pending\n ESXi 5.0 ESXi patch pending\n \n4. Solution\n\n Please review the patch/release notes for your product and \n version and verify the checksum of your downloaded file. \n\n VMware Workstation 10.x\n -------------------------------- \n https://www.vmware.com/go/downloadworkstation \n\n VMware Player 6.x\n -------------------------------- \n https://www.vmware.com/go/downloadplayer \n\n VMware Fusion 7.x and 6.x\n -------------------------------- \n https://www.vmware.com/go/downloadplayer \n\n vCenter Server\n ----------------------------\n Downloads and Documentation: \n https://www.vmware.com/go/download-vsphere \n\n ESXi 5.5 Update 2d\n ----------------------------\n File: update-from-esxi5.5-5.5_update01.zip\n md5sum: 5773844efc7d8e43135de46801d6ea25\n sha1sum: 6518355d260e81b562c66c5016781db9f077161f\n http://kb.vmware.com/kb/2065832\n update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG\n\n ESXi 5.5\n ----------------------------\n File: ESXi550-201501001.zip\n md5sum: b0f2edd9ad17d0bae5a11782aaef9304\n sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1\n http://kb.vmware.com/kb/2099265\n ESXi550-201501001.zip contains ESXi550-201501101-SG\n\n ESXi 5.1\n ----------------------------\n File: ESXi510-201404001.zip\n md5sum: 9dc3c9538de4451244a2b62d247e52c4\n sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66\n http://kb.vmware.com/kb/2070666\n ESXi510-201404001 contains ESXi510-201404101-SG\n\n ESXi 5.0\n ----------------------------\n File: ESXi500-201405001.zip\n md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d\n sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5\n http://kb.vmware.com/kb/2075521\n ESXi500-201405001 contains ESXi500-201405101-SG\n \n5. Change log\n\n 2015-01-27 VMSA-2015-0001\n Initial security advisory in conjunction with the release of VMware\n Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d\n and, ESXi 5.5 Patches released on 2015-01-27. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce at lists.vmware.com\n bugtraq at securityfocus.com\n fulldisclosure at seclists.org\n\n E-mail: security at vmware.com\n PGP key at: http://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n Consolidated list of VMware Security Advisories\n http://kb.vmware.com/kb/2078735\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n \n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2015 VMware Inc. All rights reserved", "sources": [ { "db": "NVD", "id": "CVE-2014-3513" }, { "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "db": "BID", "id": "70586" }, { "db": "PACKETSTORM", "id": "128708" }, { "db": "PACKETSTORM", "id": "131254" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "VULMON", "id": "CVE-2014-3513" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "132467" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "128704" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "PACKETSTORM", "id": "130144" } ], "trust": 3.15 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3513", "trust": 3.5 }, { "db": "SECUNIA", "id": "61439", "trust": 1.1 }, { "db": "SECUNIA", "id": "61058", "trust": 1.1 }, { "db": "SECUNIA", "id": "61207", "trust": 1.1 }, { "db": "SECUNIA", "id": "61837", "trust": 1.1 }, { "db": "SECUNIA", "id": "62070", "trust": 1.1 }, { "db": "SECUNIA", "id": "61298", "trust": 1.1 }, { "db": "SECUNIA", "id": "61990", "trust": 1.1 }, { "db": "SECUNIA", "id": "61073", "trust": 1.1 }, { "db": "SECUNIA", "id": "59627", "trust": 1.1 }, { "db": "SECUNIA", "id": "61959", "trust": 1.1 }, { "db": "SECTRACK", "id": "1031052", "trust": 1.1 }, { "db": "BID", "id": "70584", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10091", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU99970459", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-004939", "trust": 0.8 }, { "db": "BID", "id": "70586", "trust": 0.3 }, { "db": "VULMON", "id": "CVE-2014-3513", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169664", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131306", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128704", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131014", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132467", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130144", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137292", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128708", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132081", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133617", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128808", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128706", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131254", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3513" }, { "db": "BID", "id": "70586" }, { "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "128704" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132467" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "128708" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "131254" }, { "db": "NVD", "id": "CVE-2014-3513" } ] }, "id": "VAR-201410-0371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.3482142825 }, "last_update_date": "2024-11-29T20:53:44.405000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2015-09-16-2 Xcode 7.0", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "title": "HT205217", "trust": 0.8, "url": "https://support.apple.com/en-us/HT205217" }, { "title": "HT205217", "trust": 0.8, "url": "http://support.apple.com/ja-jp/HT205217" }, { "title": "HPSBHF03300", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "title": "HPSBMU03223", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "title": "HPSBMU03260", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "title": "HPSBMU03261", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "title": "HPSBMU03263", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "title": "HPSBMU03267", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "title": "HPSBMU03296", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "title": "HPSBMU03304", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "title": "HPSBGN03233", "trust": 0.8, "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "title": "HPSBMU03611", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05150888" }, { "title": "HPSBMU03612", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05158380" }, { "title": "AIX OpenSSL Denial of Service due to memory leak in DTLS SRTP extension", "trust": 0.8, "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "title": "1686997", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "title": "Fix for SRTP Memory Leak", "trust": 0.8, "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d" }, { "title": "SRTP Memory Leak (CVE-2014-3513)", "trust": 0.8, "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "title": "RHSA-2014:1652", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "title": "RHSA-2014:1692", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" }, { "title": "sol15722: OpenSSL DTLS SRTP Memory Leak CVE-2014-3513", "trust": 0.8, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "title": "Multiple vulnerabilities in OpenSSL", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2014/10/15/openssl_ddos_vulns/" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2385-1" }, { "title": "Red Hat: CVE-2014-3513", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-3513" }, { "title": "Debian Security Advisories: DSA-3053-1 openssl -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=89bdef3607a7448566a930eca0e94cb3" }, { "title": "Amazon Linux AMI: ALAS-2014-427", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-427" }, { "title": "Symantec Security Advisories: SA87 : OpenSSL Security Advisory 15-Oct-2014", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=374cff59719675d8235f907c21b99bfc" }, { "title": "Tenable Security Advisories: [R7] OpenSSL \u002720141015\u0027 Advisory Affects Tenable Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2014-11" }, { "title": "IBM: IBM Security Bulletin: Fabric OS firmware for Brocade 8Gb SAN Switch Module for BladeCenter is affected by vulnerabilities in OpenSSL and OpenSSH", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=b7f5b1e7edcafce07f28205855d4db49" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3513" }, { "db": "JVNDB", "id": "JVNDB-2014-004939" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "db": "NVD", "id": "CVE-2014-3513" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://advisories.mageia.org/mgasa-2014-0416.html" }, { "trust": 1.6, "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "trust": 1.4, "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "trust": 1.4, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3567" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3513" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2014-1652.html" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-2385-1" }, { "trust": 1.1, "url": "http://www.debian.org/security/2014/dsa-3053" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2014-1692.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59627" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61298" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61959" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61439" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61073" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/70584" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62070" }, { "trust": 1.1, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031052" }, { "trust": 1.1, "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "trust": 1.1, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-015.txt.asc" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61207" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61058" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61990" }, { "trust": 1.1, "url": "http://secunia.com/advisories/61837" }, { "trust": 1.1, "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:062" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/sep/msg00002.html" }, { "trust": 1.1, "url": "https://support.apple.com/ht205217" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888" }, { "trust": 1.1, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "trust": 1.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10091" }, { "trust": 1.1, "url": "https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=2b0532f3984324ebe1236a63d15893792384328d" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3568" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3566" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu99970459/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3513" }, { "trust": 0.5, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.5, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.5, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3508" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3509" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3511" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-5139" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21687676" }, { "trust": 0.3, "url": "http://www.openssl.org" }, { "trust": 0.3, "url": "https://bto.bluecoat.com/security-advisory/sa87" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690537" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959161" }, { "trust": 0.3, "url": "http://www.splunk.com/view/sp-caaanst" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21691210" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/158" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/156" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/157" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574073" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/may/159" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/feb/151" }, { "trust": 0.3, "url": "http://support.citrix.com/article/ctx216642" }, { "trust": 0.3, "url": "https://www.freebsd.org/security/advisories/freebsd-sa-14:23.openssl.asc" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04492722" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692" }, { "trust": 0.3, "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04616259" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/apr/35" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04624296" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05150888" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05158380" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04533567 " }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04533567 " }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21686792" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098196" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "trust": 0.3, "url": "https://support.asperasoft.com/entries/103000206-security-advisory-cve-2014-3513-cve-2014-3566-poodle-cve-2014-3567-cve-2014-3568" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097074" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21884030" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959134" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21691005" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21688284" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697995" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697165" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687801" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21689482" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097375" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689101" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700275" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098265" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021548" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097587" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701452" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098251" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098105" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693662" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689347" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097159" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097913" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21697162" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097867" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097911" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097807" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098586" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689743" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1020593" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691140" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2015-0001.html " }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101009000" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699200" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700489" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687863" }, { "trust": 0.3, "url": "www-01.ibm.com/support/docview.wss?uid=ssg1s1005003" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_" }, { "trust": 0.2, "url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2385-1/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3513" }, { "trust": 0.1, "url": "https://www.openssl.org/~bodo/ssl-poodle.pdf" }, { "trust": 0.1, "url": "https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00" }, { "trust": 0.1, "url": "https://www.openssl.org/about/secpolicy.html" }, { "trust": 0.1, "url": "http://www.hp.com/go/oa" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "http://h20565.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04486577-1" }, { "trust": 0.1, "url": "https://technet.microsoft.com/library/security/3009008" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1044" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1044" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2078735" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2070666" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1043" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8370" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2075521" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2065832" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadplayer" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3660" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1043" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadworkstation" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3660" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2099265" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8370" }, { "trust": 0.1, "url": "https://www.vmware.com/go/download-vsphere" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7995" }, { "trust": 0.1, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-6750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1790" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8035" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0705" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1788" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1792" }, { "trust": 0.1, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0799" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3237" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1789" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1791" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0728" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7501" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7547" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4969" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6565" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0205" }, { "trust": 0.1, "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3194" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3569" }, { "trust": 0.1, "url": "http://www.hpe.com/info/insightcontrol" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.7" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.22" }, { "trust": 0.1, "url": "http://h18013.www1.hp.com/products/servers/management/hpsim/download.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5910" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3185" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://developer.apple.com/xcode/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6394" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0251" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5909" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch" }, { "trust": 0.1, "url": "http://www.freebsd.org/handbook/makeworld.html\u003e." }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch.asc" }, { "trust": 0.1, "url": "http://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513\u003e" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch.asc" }, { "trust": 0.1, "url": "http://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "http://security.freebsd.org/advisories/freebsd-sa-14:23.openssl.asc\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566\u003e" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-9.3.patch" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-10.0.patch" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568\u003e" }, { "trust": 0.1, "url": "http://security.freebsd.org/patches/sa-14:23/openssl-8.4.patch.asc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567\u003e" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3513.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3567.html" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/1232123" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-2557aa7dc1654cf6b547c1a9e4" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-bd2042a1c7574aad90c4839efe" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-57ab6bb78b6e47a18718f44133" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-00eb9ac82e86449e8c3ba101bd" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-34bcab41ac7e4db299e3f5f2f1" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-062078f1ae354b7e99c86c151c" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-5827037475e44abab586463723" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-7b23e47d5d9b420b94bd1323eb" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3513" }, { "db": "BID", "id": "70586" }, { "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "128704" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132467" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "128708" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "131254" }, { "db": "NVD", "id": "CVE-2014-3513" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2014-3513" }, { "db": "BID", "id": "70586" }, { "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "db": "PACKETSTORM", "id": "169664" }, { "db": "PACKETSTORM", "id": "131306" }, { "db": "PACKETSTORM", "id": "128704" }, { "db": "PACKETSTORM", "id": "131014" }, { "db": "PACKETSTORM", "id": "132467" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "137292" }, { "db": "PACKETSTORM", "id": "128708" }, { "db": "PACKETSTORM", "id": "132081" }, { "db": "PACKETSTORM", "id": "133617" }, { "db": "PACKETSTORM", "id": "128808" }, { "db": "PACKETSTORM", "id": "128706" }, { "db": "PACKETSTORM", "id": "131254" }, { "db": "NVD", "id": "CVE-2014-3513" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-19T00:00:00", "db": "VULMON", "id": "CVE-2014-3513" }, { "date": "2014-10-15T00:00:00", "db": "BID", "id": "70586" }, { "date": "2014-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "date": "2014-10-15T12:12:12", "db": "PACKETSTORM", "id": "169664" }, { "date": "2015-04-06T19:11:05", "db": "PACKETSTORM", "id": "131306" }, { "date": "2014-10-17T00:03:05", "db": "PACKETSTORM", "id": "128704" }, { "date": "2015-03-25T00:42:25", "db": "PACKETSTORM", "id": "131014" }, { "date": "2015-06-29T15:35:42", "db": "PACKETSTORM", "id": "132467" }, { "date": "2015-01-28T18:22:00", "db": "PACKETSTORM", "id": "130144" }, { "date": "2016-06-02T19:12:12", "db": "PACKETSTORM", "id": "137292" }, { "date": "2014-10-17T00:03:35", "db": "PACKETSTORM", "id": "128708" }, { "date": "2015-05-29T23:37:11", "db": "PACKETSTORM", "id": "132081" }, { "date": "2015-09-19T15:31:48", "db": "PACKETSTORM", "id": "133617" }, { "date": "2014-10-22T19:54:29", "db": "PACKETSTORM", "id": "128808" }, { "date": "2014-10-17T00:03:21", "db": "PACKETSTORM", "id": "128706" }, { "date": "2015-04-02T00:37:56", "db": "PACKETSTORM", "id": "131254" }, { "date": "2014-10-19T01:55:13.887000", "db": "NVD", "id": "CVE-2014-3513" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2014-3513" }, { "date": "2016-09-09T15:00:00", "db": "BID", "id": "70586" }, { "date": "2016-10-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004939" }, { "date": "2024-11-21T02:08:16.653000", "db": "NVD", "id": "CVE-2014-3513" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "70586" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL of DTLS SRTP Extension d1_srtp.c Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004939" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "70586" } ], "trust": 0.3 } }
gsd-2014-3513
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-3513", "description": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.", "id": "GSD-2014-3513", "references": [ "https://www.suse.com/security/cve/CVE-2014-3513.html", "https://www.debian.org/security/2014/dsa-3053", "https://access.redhat.com/errata/RHSA-2014:1692", "https://access.redhat.com/errata/RHSA-2014:1652", "https://ubuntu.com/security/CVE-2014-3513", "https://advisories.mageia.org/CVE-2014-3513.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-3513.html", "https://linux.oracle.com/cve/CVE-2014-3513.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-3513" ], "details": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.", "id": "GSD-2014-3513", "modified": "2023-12-13T01:22:53.802494Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3513", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "HPSBHF03300", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "openSUSE-SU-2014:1331", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "name": "https://www.openssl.org/news/secadv_20141015.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "1031052", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031052" }, { "name": "62070", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62070" }, { "name": "61073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61073" }, { "name": "USN-2385-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "HPSBMU03304", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "GLSA-201412-39", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "DSA-3053", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3053" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "HPSBMU03223", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "HPSBMU03260", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205217" }, { "name": "70584", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70584" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "SUSE-SU-2014:1357", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" }, { "name": "NetBSD-SA2014-015", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html", "refsource": "CONFIRM", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "name": "61837", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61837" }, { "name": "61207", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61207" }, { "name": "RHSA-2014:1652", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "59627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59627" }, { "name": "SSRT101894", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "61298", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61298" }, { "name": "HPSBMU03263", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "HPSBMU03296", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "61990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61990" }, { "name": "61959", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61959" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "name": "http://advisories.mageia.org/MGASA-2014-0416.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "HPSBMU03267", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "HPSBMU03261", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "61058", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61058" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBGN03233", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "SSRT101739", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "61439", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61439" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "RHSA-2014:1692", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3513" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2b0532f3984324ebe1236a63d15893792384328d" }, { "name": "https://www.openssl.org/news/secadv_20141015.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv_20141015.txt" }, { "name": "RHSA-2014:1652", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1652.html" }, { "name": "DSA-3053", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-3053" }, { "name": "RHSA-2014:1692", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1692.html" }, { "name": "openSUSE-SU-2014:1331", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" }, { "name": "USN-2385-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2385-1" }, { "name": "http://advisories.mageia.org/MGASA-2014-0416.html", "refsource": "CONFIRM", "tags": [], "url": "http://advisories.mageia.org/MGASA-2014-0416.html" }, { "name": "59627", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59627" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", "refsource": "CONFIRM", "tags": [], "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc" }, { "name": "61298", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61298" }, { "name": "61959", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61959" }, { "name": "61439", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61439" }, { "name": "SUSE-SU-2014:1357", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" }, { "name": "61073", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61073" }, { "name": "70584", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/70584" }, { "name": "62070", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62070" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6", "refsource": "CONFIRM", "tags": [], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6" }, { "name": "1031052", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1031052" }, { "name": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html", "refsource": "CONFIRM", "tags": [], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15722.html" }, { "name": "NetBSD-SA2014-015", "refsource": "NETBSD", "tags": [], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc" }, { "name": "61207", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61207" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997" }, { "name": "61058", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61058" }, { "name": "61990", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61990" }, { "name": "61837", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61837" }, { "name": "GLSA-201412-39", "refsource": "GENTOO", "tags": [ "Patch" ], "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml" }, { "name": "HPSBMU03260", "refsource": "HP", "tags": [ "Patch" ], "url": "http://marc.info/?l=bugtraq\u0026m=142495837901899\u0026w=2" }, { "name": "HPSBMU03267", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142624590206005\u0026w=2" }, { "name": "SSRT101868", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2" }, { "name": "MDVSA-2015:062", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" }, { "name": "HPSBMU03304", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142791032306609\u0026w=2" }, { "name": "HPSBMU03296", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142834685803386\u0026w=2" }, { "name": "HPSBHF03300", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=142804214608580\u0026w=2" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT205217" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" }, { "name": "HPSBMU03223", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143290583027876\u0026w=2" }, { "name": "HPSBMU03263", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143290437727362\u0026w=2" }, { "name": "HPSBMU03261", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143290522027658\u0026w=2" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091", "refsource": "CONFIRM", "tags": [], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10091" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-01-03T02:59Z", "publishedDate": "2014-10-19T01:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.