Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-1971 (GCVE-0-2020-1971)
Vulnerability from cvelistv5 – Published: 2020-12-08 15:30 – Updated: 2024-09-17 02:57- NULL pointer dereference
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:54:00.529Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.openssl.org/news/secadv/20201208.txt"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e"
},
{
"name": "DSA-4807",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2020/dsa-4807"
},
{
"name": "FreeBSD-SA-20:33",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc"
},
{
"name": "[debian-lts-announce] 20201214 [SECURITY] [DLA 2493-1] openssl1.0 security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html"
},
{
"name": "[debian-lts-announce] 20201214 [SECURITY] [DLA 2492-1] openssl security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html"
},
{
"name": "FEDORA-2020-ef1870065a",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/"
},
{
"name": "[pulsar-commits] 20201216 [GitHub] [pulsar] phijohns-tibco opened a new issue #8978: OpenSSL needs to be updated to 1.1.1i current version is unsupported.",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E"
},
{
"name": "FEDORA-2020-a31b01e945",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/"
},
{
"name": "GLSA-202012-13",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202012-13"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2020-11"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20201218-0005/"
},
{
"tags": [
"x_transferred"
],
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676"
},
{
"name": "[tomcat-dev] 20210207 [Bug 65126] New: A security vulnerability cve-2020-1971 in Tomcat dependency Library in version 9.0.40.",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"name": "[oss-security] 20210914 Re: Oracle Solaris membership in the distros list",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/14/2"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "OpenSSL",
"vendor": "OpenSSL",
"versions": [
{
"status": "affected",
"version": "Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h)"
},
{
"status": "affected",
"version": "Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w)"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "David Benjamin (Google)"
}
],
"datePublic": "2020-12-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w)."
}
],
"metrics": [
{
"other": {
"content": {
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#High",
"value": "High"
},
"type": "unknown"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NULL pointer dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-21T19:06:11.147Z",
"orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"shortName": "openssl"
},
"references": [
{
"url": "https://www.openssl.org/news/secadv/20201208.txt"
},
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920"
},
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e"
},
{
"name": "DSA-4807",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4807"
},
{
"name": "FreeBSD-SA-20:33",
"tags": [
"vendor-advisory"
],
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc"
},
{
"name": "[debian-lts-announce] 20201214 [SECURITY] [DLA 2493-1] openssl1.0 security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html"
},
{
"name": "[debian-lts-announce] 20201214 [SECURITY] [DLA 2492-1] openssl security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html"
},
{
"name": "FEDORA-2020-ef1870065a",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/"
},
{
"name": "[pulsar-commits] 20201216 [GitHub] [pulsar] phijohns-tibco opened a new issue #8978: OpenSSL needs to be updated to 1.1.1i current version is unsupported.",
"tags": [
"mailing-list"
],
"url": "https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E"
},
{
"name": "FEDORA-2020-a31b01e945",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/"
},
{
"name": "GLSA-202012-13",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202012-13"
},
{
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.tenable.com/security/tns-2020-11"
},
{
"url": "https://security.netapp.com/advisory/ntap-20201218-0005/"
},
{
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676"
},
{
"name": "[tomcat-dev] 20210207 [Bug 65126] New: A security vulnerability cve-2020-1971 in Tomcat dependency Library in version 9.0.40.",
"tags": [
"mailing-list"
],
"url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.tenable.com/security/tns-2021-09"
},
{
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"name": "[oss-security] 20210914 Re: Oracle Solaris membership in the distros list",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2021/09/14/2"
},
{
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
}
],
"title": "EDIPARTYNAME NULL pointer dereference"
}
},
"cveMetadata": {
"assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"assignerShortName": "openssl",
"cveId": "CVE-2020-1971",
"datePublished": "2020-12-08T15:30:16.835Z",
"dateReserved": "2019-12-03T00:00:00.000Z",
"dateUpdated": "2024-09-17T02:57:20.238Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0.2\", \"versionEndExcluding\": \"1.0.2x\", \"matchCriteriaId\": \"4D0947DA-4A07-4C73-9FE7-7666734C568B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.1.1\", \"versionEndExcluding\": \"1.1.1i\", \"matchCriteriaId\": \"BFE3E95C-90F0-48C0-A737-28AD6AC2BDB8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36D96259-24BD-44E2-96D9-78CE1D41F956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5553591-073B-45E3-999F-21B8BA2EEE22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"D40AD626-B23A-44A3-A6C0-1FFB4D647AE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"B602F9E8-1580-436C-A26D-6E6F8121A583\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"77C3DD16-1D81-40E1-B312-50FBD275507C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"81DAC8C0-D342-44B5-9432-6B88D389584F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2A5B24D-BDF2-423C-98EA-A40778C01A05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.0.0\", \"versionEndIncluding\": \"8.1.0\", \"matchCriteriaId\": \"B5B4A191-44AE-4C35-9164-19237D2CF013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.2.0\", \"versionEndIncluding\": \"8.2.3\", \"matchCriteriaId\": \"A543B4F8-149A-48AB-B388-AB7FA2ECAC18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_session_border_controller:cz8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45F90ABB-2633-447C-B510-D63D9898BD67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_session_border_controller:cz8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22822A0F-A2C4-427A-931F-428D2C010ECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_session_border_controller:cz8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A561CF-09BE-4EDB-AAB7-4B057C0B0E44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_session_router:cz8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58E8C3A9-1B8B-4D13-B0E9-DC620F619DD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_session_router:cz8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C880943-5A11-483E-9DA8-88D1D487BAA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_session_router:cz8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECF63433-30CC-4E0D-B66A-FD160111763B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:cz8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"662B8154-6FFA-4B63-B5AD-18B1CECB3AF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:cz8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F2BFCE3-D743-4AC6-8FEC-75CAF66BFB65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:cz8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8D05530-BFC7-4652-B387-BC931F43AB5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_unified_session_manager:scz8.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A200B074-61AF-4E1D-8F96-A73BECF81BC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_communications_broker:pcz3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83739D8B-EAA0-43CD-B0EB-278C2F65CA42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_communications_broker:pcz3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D3AD28E-4372-4B22-A0B9-B9BA7760E381\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_communications_broker:pcz3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B317147-064A-4786-B3D6-CDE1653E067E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7582B307-3899-4BBB-B868-BC912A4D0109\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61516569-C48F-4362-B334-8CA10EDB0EC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B095CC03-7077-4A58-AB25-CC5380CDCE5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_session_border_controller:cz8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC124081-4465-4A80-897A-1DAC1013915E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_session_border_controller:cz8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2AFC7C4-9FCC-425B-A010-F9EA0665753F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:enterprise_session_border_controller:cz8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC109637-7BCA-4E9D-AC51-48D488E17E2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"394A16F2-CCD4-44E5-BF6B-E0C782A9FA38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:19.3.4:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"937F66F5-F5BA-4156-82E0-EB2C99ABD41A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:graalvm:20.3.0:*:*:*:enterprise:*:*:*\", \"matchCriteriaId\": \"BC0F8B31-F93B-40B6-9C06-A3996DC63829\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD04BEE5-E9A8-4584-A68C-0195CE9C402C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.2.5.3\", \"matchCriteriaId\": \"4BCA7DD9-8599-4E43-9D82-999BE15483B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B1CAD50-749F-4ADB-A046-BF3585677A58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.0.22\", \"matchCriteriaId\": \"16DEEDB2-E304-41A3-97DB-EDDFB16BE624\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.7.32\", \"matchCriteriaId\": \"B4335442-548B-48AB-A399-DB146C6A8705\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.0.15\", \"versionEndIncluding\": \"8.0.22\", \"matchCriteriaId\": \"B7EAD39D-A892-4667-89D9-F66A33EAF9B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0A735B4-4F3C-416B-8C08-9CB21BAD2889\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E1E416B-920B-49A0-9523-382898C2979D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\", \"matchCriteriaId\": \"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"B55E8D50-99B4-47EC-86F9-699B67D473CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62347994-1353-497C-9C4A-D5D8D95F67E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*\", \"matchCriteriaId\": \"6C2ACC32-5147-4EA5-95BE-B6B4EAB3D82B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0\", \"versionEndIncluding\": \"11.60.3\", \"matchCriteriaId\": \"BD1E9594-C46F-40D1-8BC2-6B16635B55C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3C19813-E823-456A-B1CE-EC0684CE1953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D39DCAE7-494F-40B2-867F-6C6A077939DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5735E553-9731-4AAC-BCFF-989377F817B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"361B791A-D336-4431-8F68-8135BEFFAEA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD7447BC-F315-4298-A822-549942FC118B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02DEB4FB-A21D-4CB1-B522-EEE5093E8521\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:ef600a_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5356D8E0-38AB-44F2-BA0A-F884C92222D1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:ef600a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44824034-DB0C-47AC-A32F-1EA373F30A61\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D5DE972-F8B8-4964-943A-DA0BD18289D1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4B1F59C-6ADA-4930-834F-2A8A8444F6AE\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9\", \"matchCriteriaId\": \"4ACF85D6-6B45-43DA-9C01-F0208186F014\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.13.1\", \"matchCriteriaId\": \"A87E730E-019C-4DCB-BA73-3994ECEF0C66\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.1\", \"matchCriteriaId\": \"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"10.0.0\", \"versionEndIncluding\": \"10.12.0\", \"matchCriteriaId\": \"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"10.13.0\", \"versionEndExcluding\": \"10.23.1\", \"matchCriteriaId\": \"33081E31-5166-4064-91AA-951F5CD930D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndIncluding\": \"12.12.0\", \"matchCriteriaId\": \"564ED5C8-50D7-413A-B88E-E62B6C07336A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"12.13.0\", \"versionEndExcluding\": \"12.20.1\", \"matchCriteriaId\": \"58879E00-2C36-4C1B-9993-2422346624D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"14.0.0\", \"versionEndIncluding\": \"14.14.0\", \"matchCriteriaId\": \"428DCD7B-6F66-4F18-B780-5BD80143D482\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"14.15.0\", \"versionEndExcluding\": \"14.15.4\", \"matchCriteriaId\": \"2F2D8EEB-7A9E-472A-B820-A3C33CB93B61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"15.0.0\", \"versionEndExcluding\": \"15.5.0\", \"matchCriteriaId\": \"1A868E7E-C25A-4B2A-BB37-7F2584ECB2D4\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \\\"-crl_download\\\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\"}, {\"lang\": \"es\", \"value\": \"El tipo GeneralName X.509 es un tipo gen\\u00e9rico para representar diferentes tipos de nombres.\u0026#xa0;Uno de esos tipos de nombres se conoce como EDIPartyName.\u0026#xa0;OpenSSL proporciona una funci\\u00f3n GENERAL_NAME_cmp que compara diferentes instancias de GENERAL_NAME para ver si son iguales o no.\u0026#xa0;Esta funci\\u00f3n se comporta incorrectamente cuando ambos GENERAL_NAME contienen un EDIPARTYNAME.\u0026#xa0;Es posible que se produzca una desreferencia del puntero NULL y un bloqueo que conduzca a un posible ataque de denegaci\\u00f3n de servicio.\u0026#xa0;El propio OpenSSL usa la funci\\u00f3n GENERAL_NAME_cmp para dos prop\\u00f3sitos:\u0026#xa0;1) Comparaci\\u00f3n de nombres de puntos de distribuci\\u00f3n de CRL entre una CRL disponible y un punto de distribuci\\u00f3n de CRL insertado en un certificado X509 2) Al comparar que un firmante de token de respuesta de marca de tiempo coincide con el nombre de autoridad de marca de tiempo (expuesto por medio de las funciones API TS_RESP_verify_response y TS_RESP_verify_token) Si un atacante puede controlar ambos elementos que se est\\u00e1n comparando, entonces ese atacante podr\\u00eda desencadenar un bloqueo.\u0026#xa0;Por ejemplo, si el atacante puede enga\\u00f1ar a un cliente o servidor para que compruebe un certificado malicioso con una CRL maliciosa, esto puede ocurrir.\u0026#xa0;Tome en cuenta que algunas aplicaciones descargan autom\\u00e1ticamente las CRL basadas en una URL insertada en un certificado.\u0026#xa0;Esta comprobaci\\u00f3n ocurre antes de que se verifiquen las firmas en el certificado y la CRL.\u0026#xa0;Las herramientas s_server, s_client y verify de OpenSSL tienen soporte para la opci\\u00f3n \\\"-crl_download\\\"\u0026#xa0;que implementa la descarga autom\\u00e1tica de CRL y se ha demostrado que este ataque funciona contra esas herramientas.\u0026#xa0;Tome en cuenta que un error no relacionado significa que las versiones afectadas de OpenSSL no pueden analizar ni construir codificaciones correctas de EDIPARTYNAME.\u0026#xa0;Sin embargo, es posible construir un EDIPARTYNAME malformado que el analizador de OpenSSL aceptar\\u00e1 y, por lo tanto, desencadenar\\u00e1 este ataque.\u0026#xa0;Todas las versiones de OpenSSL 1.1.1 y 1.0.2 est\\u00e1n afectadas por este problema.\u0026#xa0;Otras versiones de OpenSSL no son compatibles y no se han comprobado.\u0026#xa0;Corregido en OpenSSL versiones 1.1.1i (Afectado versiones 1.1.1-1.1.1h).\u0026#xa0;Corregido en OpenSSL versiones 1.0.2x (Afectado versiones 1.0.2-1.0.2w).\u0026#xa0;Sin embargo, es posible construir un EDIPARTYNAME malformado que el analizador de OpenSSL aceptar\\u00e1 y, por lo tanto, desencadenar\\u00e1 este ataque.\u0026#xa0;Todas las versiones de OpenSSL 1.1.1 y 1.0.2 est\\u00e1n afectadas por este problema.\u0026#xa0;Otras versiones de OpenSSL no son compatibles y no se han comprobado.\u0026#xa0;Corregido en OpenSSL versi\\u00f3n 1.1.1i (Afectada versi\\u00f3n 1.1.1-1.1.1h).\u0026#xa0;Corregido en OpenSSL versi\\u00f3n 1.0.2x (Afectada versi\\u00f3n 1.0.2-1.0.2w).\u0026#xa0;Sin embargo, es posible construir un EDIPARTYNAME malformado que el analizador de OpenSSL aceptar\\u00e1 y, por lo tanto, desencadenar\\u00e1 este ataque.\u0026#xa0;Todas las versiones de OpenSSL 1.1.1 y 1.0.2 est\\u00e1n afectadas por este problema.\u0026#xa0;Otras versiones de OpenSSL no son compatibles y no se han comprobado.\u0026#xa0;Corregido en OpenSSL versi\\u00f3n 1.1.1i (Afectada versi\\u00f3n 1.1.1-1.1.1h).\u0026#xa0;Corregido en OpenSSL versi\\u00f3n 1.0.2x (Afectada versi\\u00f3n 1.0.2-1.0.2w)\"}]",
"id": "CVE-2020-1971",
"lastModified": "2024-11-21T05:11:45.673",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-12-08T16:15:11.730",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2021/09/14/2\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202012-13\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20201218-0005/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210513-0002/\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"openssl-security@openssl.org\"}, {\"url\": \"https://www.debian.org/security/2020/dsa-4807\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.openssl.org/news/secadv/20201208.txt\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.oracle.com//security-alerts/cpujul2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuApr2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2021.html\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2020-11\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-09\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-10\", \"source\": \"openssl-security@openssl.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/09/14/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202012-13\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20201218-0005/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210513-0002/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240621-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2020/dsa-4807\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.openssl.org/news/secadv/20201208.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.oracle.com//security-alerts/cpujul2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuApr2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuoct2021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2020-11\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-09\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.tenable.com/security/tns-2021-10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "openssl-security@openssl.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-1971\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2020-12-08T16:15:11.730\",\"lastModified\":\"2024-11-21T05:11:45.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \\\"-crl_download\\\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).\"},{\"lang\":\"es\",\"value\":\"El tipo GeneralName X.509 es un tipo gen\u00e9rico para representar diferentes tipos de nombres.\u0026#xa0;Uno de esos tipos de nombres se conoce como EDIPartyName.\u0026#xa0;OpenSSL proporciona una funci\u00f3n GENERAL_NAME_cmp que compara diferentes instancias de GENERAL_NAME para ver si son iguales o no.\u0026#xa0;Esta funci\u00f3n se comporta incorrectamente cuando ambos GENERAL_NAME contienen un EDIPARTYNAME.\u0026#xa0;Es posible que se produzca una desreferencia del puntero NULL y un bloqueo que conduzca a un posible ataque de denegaci\u00f3n de servicio.\u0026#xa0;El propio OpenSSL usa la funci\u00f3n GENERAL_NAME_cmp para dos prop\u00f3sitos:\u0026#xa0;1) Comparaci\u00f3n de nombres de puntos de distribuci\u00f3n de CRL entre una CRL disponible y un punto de distribuci\u00f3n de CRL insertado en un certificado X509 2) Al comparar que un firmante de token de respuesta de marca de tiempo coincide con el nombre de autoridad de marca de tiempo (expuesto por medio de las funciones API TS_RESP_verify_response y TS_RESP_verify_token) Si un atacante puede controlar ambos elementos que se est\u00e1n comparando, entonces ese atacante podr\u00eda desencadenar un bloqueo.\u0026#xa0;Por ejemplo, si el atacante puede enga\u00f1ar a un cliente o servidor para que compruebe un certificado malicioso con una CRL maliciosa, esto puede ocurrir.\u0026#xa0;Tome en cuenta que algunas aplicaciones descargan autom\u00e1ticamente las CRL basadas en una URL insertada en un certificado.\u0026#xa0;Esta comprobaci\u00f3n ocurre antes de que se verifiquen las firmas en el certificado y la CRL.\u0026#xa0;Las herramientas s_server, s_client y verify de OpenSSL tienen soporte para la opci\u00f3n \\\"-crl_download\\\"\u0026#xa0;que implementa la descarga autom\u00e1tica de CRL y se ha demostrado que este ataque funciona contra esas herramientas.\u0026#xa0;Tome en cuenta que un error no relacionado significa que las versiones afectadas de OpenSSL no pueden analizar ni construir codificaciones correctas de EDIPARTYNAME.\u0026#xa0;Sin embargo, es posible construir un EDIPARTYNAME malformado que el analizador de OpenSSL aceptar\u00e1 y, por lo tanto, desencadenar\u00e1 este ataque.\u0026#xa0;Todas las versiones de OpenSSL 1.1.1 y 1.0.2 est\u00e1n afectadas por este problema.\u0026#xa0;Otras versiones de OpenSSL no son compatibles y no se han comprobado.\u0026#xa0;Corregido en OpenSSL versiones 1.1.1i (Afectado versiones 1.1.1-1.1.1h).\u0026#xa0;Corregido en OpenSSL versiones 1.0.2x (Afectado versiones 1.0.2-1.0.2w).\u0026#xa0;Sin embargo, es posible construir un EDIPARTYNAME malformado que el analizador de OpenSSL aceptar\u00e1 y, por lo tanto, desencadenar\u00e1 este ataque.\u0026#xa0;Todas las versiones de OpenSSL 1.1.1 y 1.0.2 est\u00e1n afectadas por este problema.\u0026#xa0;Otras versiones de OpenSSL no son compatibles y no se han comprobado.\u0026#xa0;Corregido en OpenSSL versi\u00f3n 1.1.1i (Afectada versi\u00f3n 1.1.1-1.1.1h).\u0026#xa0;Corregido en OpenSSL versi\u00f3n 1.0.2x (Afectada versi\u00f3n 1.0.2-1.0.2w).\u0026#xa0;Sin embargo, es posible construir un EDIPARTYNAME malformado que el analizador de OpenSSL aceptar\u00e1 y, por lo tanto, desencadenar\u00e1 este ataque.\u0026#xa0;Todas las versiones de OpenSSL 1.1.1 y 1.0.2 est\u00e1n afectadas por este problema.\u0026#xa0;Otras versiones de OpenSSL no son compatibles y no se han comprobado.\u0026#xa0;Corregido en OpenSSL versi\u00f3n 1.1.1i (Afectada versi\u00f3n 1.1.1-1.1.1h).\u0026#xa0;Corregido en OpenSSL versi\u00f3n 1.0.2x (Afectada versi\u00f3n 1.0.2-1.0.2w)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.2\",\"versionEndExcluding\":\"1.0.2x\",\"matchCriteriaId\":\"4D0947DA-4A07-4C73-9FE7-7666734C568B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.1\",\"versionEndExcluding\":\"1.1.1i\",\"matchCriteriaId\":\"BFE3E95C-90F0-48C0-A737-28AD6AC2BDB8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5553591-073B-45E3-999F-21B8BA2EEE22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"D40AD626-B23A-44A3-A6C0-1FFB4D647AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B602F9E8-1580-436C-A26D-6E6F8121A583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"77C3DD16-1D81-40E1-B312-50FBD275507C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"81DAC8C0-D342-44B5-9432-6B88D389584F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A5B24D-BDF2-423C-98EA-A40778C01A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.1.0\",\"matchCriteriaId\":\"B5B4A191-44AE-4C35-9164-19237D2CF013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.2.0\",\"versionEndIncluding\":\"8.2.3\",\"matchCriteriaId\":\"A543B4F8-149A-48AB-B388-AB7FA2ECAC18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:cz8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45F90ABB-2633-447C-B510-D63D9898BD67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:cz8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22822A0F-A2C4-427A-931F-428D2C010ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:cz8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A561CF-09BE-4EDB-AAB7-4B057C0B0E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_router:cz8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E8C3A9-1B8B-4D13-B0E9-DC620F619DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_router:cz8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C880943-5A11-483E-9DA8-88D1D487BAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_router:cz8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF63433-30CC-4E0D-B66A-FD160111763B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:cz8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"662B8154-6FFA-4B63-B5AD-18B1CECB3AF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:cz8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2BFCE3-D743-4AC6-8FEC-75CAF66BFB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:cz8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D05530-BFC7-4652-B387-BC931F43AB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_session_manager:scz8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A200B074-61AF-4E1D-8F96-A73BECF81BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:pcz3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83739D8B-EAA0-43CD-B0EB-278C2F65CA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:pcz3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3AD28E-4372-4B22-A0B9-B9BA7760E381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:pcz3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B317147-064A-4786-B3D6-CDE1653E067E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7582B307-3899-4BBB-B868-BC912A4D0109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61516569-C48F-4362-B334-8CA10EDB0EC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B095CC03-7077-4A58-AB25-CC5380CDCE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_session_border_controller:cz8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC124081-4465-4A80-897A-1DAC1013915E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_session_border_controller:cz8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2AFC7C4-9FCC-425B-A010-F9EA0665753F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_session_border_controller:cz8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC109637-7BCA-4E9D-AC51-48D488E17E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"394A16F2-CCD4-44E5-BF6B-E0C782A9FA38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.3.4:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"937F66F5-F5BA-4156-82E0-EB2C99ABD41A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"BC0F8B31-F93B-40B6-9C06-A3996DC63829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD04BEE5-E9A8-4584-A68C-0195CE9C402C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.2.5.3\",\"matchCriteriaId\":\"4BCA7DD9-8599-4E43-9D82-999BE15483B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1CAD50-749F-4ADB-A046-BF3585677A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.22\",\"matchCriteriaId\":\"16DEEDB2-E304-41A3-97DB-EDDFB16BE624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.7.32\",\"matchCriteriaId\":\"B4335442-548B-48AB-A399-DB146C6A8705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.15\",\"versionEndIncluding\":\"8.0.22\",\"matchCriteriaId\":\"B7EAD39D-A892-4667-89D9-F66A33EAF9B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A735B4-4F3C-416B-8C08-9CB21BAD2889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E416B-920B-49A0-9523-382898C2979D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62347994-1353-497C-9C4A-D5D8D95F67E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"6C2ACC32-5147-4EA5-95BE-B6B4EAB3D82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.60.3\",\"matchCriteriaId\":\"BD1E9594-C46F-40D1-8BC2-6B16635B55C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D39DCAE7-494F-40B2-867F-6C6A077939DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE0A9D2-9A49-4BF6-BC6F-8249162D8334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361B791A-D336-4431-8F68-8135BEFFAEA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02DEB4FB-A21D-4CB1-B522-EEE5093E8521\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:ef600a_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5356D8E0-38AB-44F2-BA0A-F884C92222D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:ef600a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44824034-DB0C-47AC-A32F-1EA373F30A61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5DE972-F8B8-4964-943A-DA0BD18289D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B1F59C-6ADA-4930-834F-2A8A8444F6AE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9\",\"matchCriteriaId\":\"4ACF85D6-6B45-43DA-9C01-F0208186F014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.13.1\",\"matchCriteriaId\":\"A87E730E-019C-4DCB-BA73-3994ECEF0C66\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.12.0\",\"matchCriteriaId\":\"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.13.0\",\"versionEndExcluding\":\"10.23.1\",\"matchCriteriaId\":\"33081E31-5166-4064-91AA-951F5CD930D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndIncluding\":\"12.12.0\",\"matchCriteriaId\":\"564ED5C8-50D7-413A-B88E-E62B6C07336A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"12.13.0\",\"versionEndExcluding\":\"12.20.1\",\"matchCriteriaId\":\"58879E00-2C36-4C1B-9993-2422346624D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.14.0\",\"matchCriteriaId\":\"428DCD7B-6F66-4F18-B780-5BD80143D482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"14.15.0\",\"versionEndExcluding\":\"14.15.4\",\"matchCriteriaId\":\"2F2D8EEB-7A9E-472A-B820-A3C33CB93B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndExcluding\":\"15.5.0\",\"matchCriteriaId\":\"1A868E7E-C25A-4B2A-BB37-7F2584ECB2D4\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/14/2\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202012-13\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20201218-0005/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210513-0002/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://www.debian.org/security/2020/dsa-4807\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20201208.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2020-11\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-09\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-10\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/14/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202012-13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20201218-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210513-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2020/dsa-4807\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20201208.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuApr2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2020-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHSA-2021_0488
Vulnerability from csaf_redhat - Published: 2021-02-11 13:29 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 6 zip release for RHEL 7, RHEL 8 and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 6 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 5 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0488",
"url": "https://access.redhat.com/errata/RHSA-2021:0488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.openssl\u0026downloadType=securityPatches\u0026version=1.1.1c",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.openssl\u0026downloadType=securityPatches\u0026version=1.1.1c"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0488.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:13+00:00",
"generator": {
"date": "2024-11-22T15:56:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0488",
"initial_release_date": "2021-02-11T13:29:52+00:00",
"revision_history": [
{
"date": "2021-02-11T13:29:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:29:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBCS 2.4.37 SP6",
"product": {
"name": "JBCS 2.4.37 SP6",
"product_id": "JBCS 2.4.37 SP6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBCS 2.4.37 SP6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:29:52+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"JBCS 2.4.37 SP6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0488"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"JBCS 2.4.37 SP6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"JBCS 2.4.37 SP6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0494
Vulnerability from csaf_redhat - Published: 2021-02-11 13:51 - Updated: 2026-03-18 02:06A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated Red Hat JBoss Web Server 5.4.1 packages are now available for Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.1 serves as a replacement for Red Hat JBoss Web Server 5.4.0, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: Apache Tomcat HTTP/2 Request mix-up (CVE-2020-13943)\n* tomcat: HTTP/2 request header mix-up (CVE-2020-17527)\n* tomcat: Information disclosure when using NTFS file system (CVE-2021-24122)\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0494",
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0494.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update",
"tracking": {
"current_release_date": "2026-03-18T02:06:29+00:00",
"generator": {
"date": "2026-03-18T02:06:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2021:0494",
"initial_release_date": "2021-02-11T13:51:48+00:00",
"revision_history": [
{
"date": "2021-02-11T13:51:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:51:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:06:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el7jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el7jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el8jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el8jws?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-3.redhat_3.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el8jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-3.redhat_3.el8jws?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
},
{
"cve": "CVE-2020-13943",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1887648"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Apache Tomcat HTTP/2 Request mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management is using an affected version of Tomcat bundled within PKI servlet engine, however HTTP/2 protocol is not supported by this component.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13943"
},
{
"category": "external",
"summary": "RHBZ#1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13943",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13943"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38"
}
],
"release_date": "2020-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Apache Tomcat HTTP/2 Request mix-up"
},
{
"cve": "CVE-2020-17527",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1904221"
}
],
"notes": [
{
"category": "description",
"text": "While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: HTTP/2 request header mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management and Certificate System are using a vulnerable version of Tomcat that is bundled into the pki-servlet-engine component. However, HTTP/2 is not enabled in such a configuration, and it is not possible to trigger the flaw in a supported setup. A future update may fix the code.\n\nRed Hat Enterprise Linux 7\u0027s tomcat package, Identity Management, and Certificate System are all not affected by this flaw because HTTP/2 is not supported in the shipped version of tomcat in those packages.\n\ntomcat5 and tomcat6 in Red Hat Enterprise Linux 5 and 6 (respectively) are not affected by this flaw because HTTP/2 is not supported in the shipped versions of those packages.\n\npki-servlet-engine has been obsoleted by Tomcat in Red Hat Enterprise Linux 8.9 and later. Therefore no additional fixes would be made available for the servlet engine.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-17527"
},
{
"category": "external",
"summary": "RHBZ#1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-17527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2020-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: HTTP/2 request header mix-up"
},
{
"cve": "CVE-2021-24122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1917209"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure when using NTFS file system",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat OpenStack Platform\u0027s OpenDaylight, tomcat is disabled by default. Further, ODL deployments are not supported on untrusted administrator networks; even if tomcat is enabled, if random users can access it, this would be in an unsupported configuration. For this reason, the RHOSP impact has been reduced and no update will be provided at this time for the ODL tomcat package.\n\nThis flaw does not affect tomcat or pki-servlet-engine as shipped with Red Hat Enterprise Linux 6, 7, or 8 because the functionality involving FindFirstFileW() is specific to the Windows native code. Additionally, RHEL is not shipped with NTFS support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-24122"
},
{
"category": "external",
"summary": "RHBZ#1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-24122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107",
"url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2021-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Information disclosure when using NTFS file system"
}
]
}
RHSA-2020:5640
Vulnerability from csaf_redhat - Published: 2020-12-21 12:07 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5640",
"url": "https://access.redhat.com/errata/RHSA-2020:5640"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5640.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:24+00:00",
"generator": {
"date": "2025-11-21T18:19:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5640",
"initial_release_date": "2020-12-21T12:07:09+00:00",
"revision_history": [
{
"date": "2020-12-21T12:07:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:07:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-61.el7_3.src",
"product": {
"name": "openssl-1:1.0.1e-61.el7_3.src",
"product_id": "openssl-1:1.0.1e-61.el7_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-61.el7_3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-static-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-static-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:07:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5640"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5623
Vulnerability from csaf_redhat - Published: 2020-12-17 17:01 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5623",
"url": "https://access.redhat.com/errata/RHSA-2020:5623"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5623.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:25+00:00",
"generator": {
"date": "2024-11-22T15:56:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5623",
"initial_release_date": "2020-12-17T17:01:47+00:00",
"revision_history": [
{
"date": "2020-12-17T17:01:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T17:01:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.src",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.src",
"product_id": "openssl-1:1.0.2k-20.el7_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T17:01:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5623"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021_0486
Vulnerability from csaf_redhat - Published: 2021-02-11 13:19 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 6 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 5 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0486",
"url": "https://access.redhat.com/errata/RHSA-2021:0486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0486.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:05+00:00",
"generator": {
"date": "2024-11-22T15:56:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0486",
"initial_release_date": "2021-02-11T13:19:08+00:00",
"revision_history": [
{
"date": "2021-02-11T13:19:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:19:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"product_id": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-40.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-3.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-35.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-18.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-3.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-66.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-31.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-12.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-58.GA.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-11.redhat_1.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-16.Final_redhat_2.jbcs.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-devel@1.0.6-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-debuginfo@1.0.6-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-35.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-35.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-35.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-18.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-18.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-3.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-3.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-66.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-66.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-31.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-31.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-12.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-12.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-58.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-58.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-11.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-11.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-11.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-16.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-16.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-66.jbcs.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:19:08+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0486"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5476
Vulnerability from csaf_redhat - Published: 2020-12-15 17:22 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Reject certificates with explicit EC parameters in strict mode (BZ#1891541)\n\n* Add FIPS selftest for HKDF, SSKDF, SSHKDF, and TLS12PRF; add DH_compute_key KAT to DH selftest (BZ#1891542)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5476",
"url": "https://access.redhat.com/errata/RHSA-2020:5476"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5476.json"
}
],
"title": "Red Hat Security Advisory: openssl security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T15:56:01+00:00",
"generator": {
"date": "2024-11-22T15:56:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5476",
"initial_release_date": "2020-12-15T17:22:46+00:00",
"revision_history": [
{
"date": "2020-12-15T17:22:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T17:22:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.src",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.src",
"product_id": "openssl-1:1.1.1g-12.el8_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.src",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T17:22:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5476"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020:5642
Vulnerability from csaf_redhat - Published: 2020-12-21 12:46 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5642",
"url": "https://access.redhat.com/errata/RHSA-2020:5642"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5642.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:25+00:00",
"generator": {
"date": "2025-11-21T18:19:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5642",
"initial_release_date": "2020-12-21T12:46:04+00:00",
"revision_history": [
{
"date": "2020-12-21T12:46:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:46:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.src",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.src",
"product_id": "openssl-1:1.0.2k-17.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:46:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5642"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020:5422
Vulnerability from csaf_redhat - Published: 2020-12-15 09:04 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5422",
"url": "https://access.redhat.com/errata/RHSA-2020:5422"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5422.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:04+00:00",
"generator": {
"date": "2025-11-21T18:19:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5422",
"initial_release_date": "2020-12-15T09:04:53+00:00",
"revision_history": [
{
"date": "2020-12-15T09:04:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T09:04:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.src",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.src",
"product_id": "openssl-1:1.1.1c-16.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T09:04:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5422"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021_0489
Vulnerability from csaf_redhat - Published: 2021-02-11 13:38 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 7.\n\nRed Hat Product Security has rated this release as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 11 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0489",
"url": "https://access.redhat.com/errata/RHSA-2021:0489"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "JWS-1938",
"url": "https://issues.redhat.com/browse/JWS-1938"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0489.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 11 security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:35+00:00",
"generator": {
"date": "2024-11-22T15:56:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0489",
"initial_release_date": "2021-02-11T13:38:43+00:00",
"revision_history": [
{
"date": "2021-02-11T13:38:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:38:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product": {
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"product": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"product_id": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-23.redhat_23.ep7.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_id": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-23.redhat_23.ep7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.23-23.redhat_23.ep7.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src"
},
"product_reference": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:38:43+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0489"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020:5641
Vulnerability from csaf_redhat - Published: 2020-12-21 12:21 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5641",
"url": "https://access.redhat.com/errata/RHSA-2020:5641"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5641.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:24+00:00",
"generator": {
"date": "2025-11-21T18:19:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5641",
"initial_release_date": "2020-12-21T12:21:57+00:00",
"revision_history": [
{
"date": "2020-12-21T12:21:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:21:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-9.el7_4.src",
"product": {
"name": "openssl-1:1.0.2k-9.el7_4.src",
"product_id": "openssl-1:1.0.2k-9.el7_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-9.el7_4?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-static-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:21:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5641"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020:5637
Vulnerability from csaf_redhat - Published: 2020-12-21 08:37 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5637",
"url": "https://access.redhat.com/errata/RHSA-2020:5637"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5637.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:23+00:00",
"generator": {
"date": "2025-11-21T18:19:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5637",
"initial_release_date": "2020-12-21T08:37:06+00:00",
"revision_history": [
{
"date": "2020-12-21T08:37:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T08:37:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.src",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.src",
"product_id": "openssl-1:1.1.1c-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T08:37:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5637"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5566
Vulnerability from csaf_redhat - Published: 2020-12-16 12:43 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5566",
"url": "https://access.redhat.com/errata/RHSA-2020:5566"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5566.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:16+00:00",
"generator": {
"date": "2024-11-22T15:56:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5566",
"initial_release_date": "2020-12-16T12:43:39+00:00",
"revision_history": [
{
"date": "2020-12-16T12:43:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-16T12:43:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.src",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.src",
"product_id": "openssl-1:1.0.2k-21.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-16T12:43:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5566"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5637
Vulnerability from csaf_redhat - Published: 2020-12-21 08:37 - Updated: 2024-11-22 15:57A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5637",
"url": "https://access.redhat.com/errata/RHSA-2020:5637"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5637.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:57:07+00:00",
"generator": {
"date": "2024-11-22T15:57:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5637",
"initial_release_date": "2020-12-21T08:37:06+00:00",
"revision_history": [
{
"date": "2020-12-21T08:37:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T08:37:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:57:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.src",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.src",
"product_id": "openssl-1:1.1.1c-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-3.el8_1?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T08:37:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5637"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:openssl-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-debugsource-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-devel-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.i686",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:openssl-perl-1:1.1.1c-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020:5639
Vulnerability from csaf_redhat - Published: 2020-12-21 12:01 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5639",
"url": "https://access.redhat.com/errata/RHSA-2020:5639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5639.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:23+00:00",
"generator": {
"date": "2025-11-21T18:19:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5639",
"initial_release_date": "2020-12-21T12:01:26+00:00",
"revision_history": [
{
"date": "2020-12-21T12:01:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:01:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-52.el7_2.src",
"product": {
"name": "openssl-1:1.0.1e-52.el7_2.src",
"product_id": "openssl-1:1.0.1e-52.el7_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-52.el7_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-static-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-static-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:01:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5639"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0486
Vulnerability from csaf_redhat - Published: 2021-02-11 13:19 - Updated: 2026-03-18 02:06A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 6 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 5 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0486",
"url": "https://access.redhat.com/errata/RHSA-2021:0486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0486.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update",
"tracking": {
"current_release_date": "2026-03-18T02:06:22+00:00",
"generator": {
"date": "2026-03-18T02:06:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2021:0486",
"initial_release_date": "2021-02-11T13:19:08+00:00",
"revision_history": [
{
"date": "2021-02-11T13:19:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:19:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:06:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"product_id": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-40.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-3.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-35.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-18.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-3.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-66.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-31.jbcs.el7?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-12.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-58.GA.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-11.redhat_1.jbcs.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-16.Final_redhat_2.jbcs.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-devel@1.0.6-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-debuginfo@1.0.6-40.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-3.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-35.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-35.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-35.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-18.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-18.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-3.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-3.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-66.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-66.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-66.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-31.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-31.jbcs.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-12.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-12.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-58.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-58.GA.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-11.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-11.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-11.redhat_1.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-16.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-16.Final_redhat_2.jbcs.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"product": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-66.jbcs.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch"
},
"product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
"product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
},
"product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64",
"relates_to_product_reference": "7Server-JBCS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:19:08+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0486"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-40.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-66.jbcs.el7.noarch",
"7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-16.Final_redhat_2.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-12.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-11.redhat_1.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-11.redhat_1.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-31.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-58.GA.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-66.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-35.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-3.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.src",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-18.jbcs.el7.x86_64",
"7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-3.jbcs.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020:5566
Vulnerability from csaf_redhat - Published: 2020-12-16 12:43 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5566",
"url": "https://access.redhat.com/errata/RHSA-2020:5566"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5566.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:14+00:00",
"generator": {
"date": "2025-11-21T18:19:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5566",
"initial_release_date": "2020-12-16T12:43:39+00:00",
"revision_history": [
{
"date": "2020-12-16T12:43:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-16T12:43:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.src",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.src",
"product_id": "openssl-1:1.0.2k-21.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.i686",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-21.el7_9.s390",
"product": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390",
"product_id": "openssl-static-1:1.0.2k-21.el7_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-21.el7_9?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-21.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-21.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-16T12:43:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5566"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Client-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Client-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Server-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Server-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.src",
"7Workstation-optional-7.9.Z:openssl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-21.el7_9.x86_64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.i686",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.s390x",
"7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-21.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0056
Vulnerability from csaf_redhat - Published: 2021-01-11 10:34 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0056",
"url": "https://access.redhat.com/errata/RHSA-2021:0056"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0056.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:35+00:00",
"generator": {
"date": "2025-11-21T18:19:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:0056",
"initial_release_date": "2021-01-11T10:34:05+00:00",
"revision_history": [
{
"date": "2021-01-11T10:34:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-11T10:34:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.src",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.src",
"product_id": "openssl-0:1.0.1e-59.el6_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.s390",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.s390",
"product_id": "openssl-0:1.0.1e-59.el6_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-59.el6_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-59.el6_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-static-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-static-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-static-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-59.el6_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.src"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T10:34:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0056"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0495
Vulnerability from csaf_redhat - Published: 2021-02-11 13:51 - Updated: 2026-03-18 02:06A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 5.4.1 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.1 serves as a replacement for Red Hat JBoss Web Server 5.4.0, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: Apache Tomcat HTTP/2 Request mix-up (CVE-2020-13943)\n* tomcat: HTTP/2 request header mix-up (CVE-2020-17527)\n* tomcat: Information disclosure when using NTFS file system (CVE-2021-24122)\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0495",
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=5.4",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=5.4"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/5.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/5.4/"
},
{
"category": "external",
"summary": "1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0495.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update",
"tracking": {
"current_release_date": "2026-03-18T02:06:25+00:00",
"generator": {
"date": "2026-03-18T02:06:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2021:0495",
"initial_release_date": "2021-02-11T13:51:32+00:00",
"revision_history": [
{
"date": "2021-02-11T13:51:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:51:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:06:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5",
"product": {
"name": "Red Hat JBoss Web Server 5",
"product_id": "Red Hat JBoss Web Server 5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"Red Hat JBoss Web Server 5"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
},
{
"cve": "CVE-2020-13943",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1887648"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Apache Tomcat HTTP/2 Request mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management is using an affected version of Tomcat bundled within PKI servlet engine, however HTTP/2 protocol is not supported by this component.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13943"
},
{
"category": "external",
"summary": "RHBZ#1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13943",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13943"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38"
}
],
"release_date": "2020-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Apache Tomcat HTTP/2 Request mix-up"
},
{
"cve": "CVE-2020-17527",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1904221"
}
],
"notes": [
{
"category": "description",
"text": "While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: HTTP/2 request header mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management and Certificate System are using a vulnerable version of Tomcat that is bundled into the pki-servlet-engine component. However, HTTP/2 is not enabled in such a configuration, and it is not possible to trigger the flaw in a supported setup. A future update may fix the code.\n\nRed Hat Enterprise Linux 7\u0027s tomcat package, Identity Management, and Certificate System are all not affected by this flaw because HTTP/2 is not supported in the shipped version of tomcat in those packages.\n\ntomcat5 and tomcat6 in Red Hat Enterprise Linux 5 and 6 (respectively) are not affected by this flaw because HTTP/2 is not supported in the shipped versions of those packages.\n\npki-servlet-engine has been obsoleted by Tomcat in Red Hat Enterprise Linux 8.9 and later. Therefore no additional fixes would be made available for the servlet engine.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-17527"
},
{
"category": "external",
"summary": "RHBZ#1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-17527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2020-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: HTTP/2 request header mix-up"
},
{
"cve": "CVE-2021-24122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1917209"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure when using NTFS file system",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat OpenStack Platform\u0027s OpenDaylight, tomcat is disabled by default. Further, ODL deployments are not supported on untrusted administrator networks; even if tomcat is enabled, if random users can access it, this would be in an unsupported configuration. For this reason, the RHOSP impact has been reduced and no update will be provided at this time for the ODL tomcat package.\n\nThis flaw does not affect tomcat or pki-servlet-engine as shipped with Red Hat Enterprise Linux 6, 7, or 8 because the functionality involving FindFirstFileW() is specific to the Windows native code. Additionally, RHEL is not shipped with NTFS support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-24122"
},
{
"category": "external",
"summary": "RHBZ#1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-24122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107",
"url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2021-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Information disclosure when using NTFS file system"
}
]
}
RHSA-2020_5640
Vulnerability from csaf_redhat - Published: 2020-12-21 12:07 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5640",
"url": "https://access.redhat.com/errata/RHSA-2020:5640"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5640.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:42+00:00",
"generator": {
"date": "2024-11-22T15:56:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5640",
"initial_release_date": "2020-12-21T12:07:09+00:00",
"revision_history": [
{
"date": "2020-12-21T12:07:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:07:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-61.el7_3.src",
"product": {
"name": "openssl-1:1.0.1e-61.el7_3.src",
"product_id": "openssl-1:1.0.1e-61.el7_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-61.el7_3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"product": {
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"product_id": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-61.el7_3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-61.el7_3.i686",
"product": {
"name": "openssl-static-1:1.0.1e-61.el7_3.i686",
"product_id": "openssl-static-1:1.0.1e-61.el7_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-61.el7_3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.i686",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-61.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-61.el7_3.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:07:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5640"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.src",
"7Server-optional-7.3.AUS:openssl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-debuginfo-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-devel-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-libs-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-perl-1:1.0.1e-61.el7_3.x86_64",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.i686",
"7Server-optional-7.3.AUS:openssl-static-1:1.0.1e-61.el7_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0488
Vulnerability from csaf_redhat - Published: 2021-02-11 13:29 - Updated: 2026-03-18 02:06A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 6 zip release for RHEL 7, RHEL 8 and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 6 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 5 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0488",
"url": "https://access.redhat.com/errata/RHSA-2021:0488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.openssl\u0026downloadType=securityPatches\u0026version=1.1.1c",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.openssl\u0026downloadType=securityPatches\u0026version=1.1.1c"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0488.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update",
"tracking": {
"current_release_date": "2026-03-18T02:06:22+00:00",
"generator": {
"date": "2026-03-18T02:06:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2021:0488",
"initial_release_date": "2021-02-11T13:29:52+00:00",
"revision_history": [
{
"date": "2021-02-11T13:29:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:29:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:06:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "JBCS 2.4.37 SP6",
"product": {
"name": "JBCS 2.4.37 SP6",
"product_id": "JBCS 2.4.37 SP6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"JBCS 2.4.37 SP6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:29:52+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"JBCS 2.4.37 SP6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0488"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"JBCS 2.4.37 SP6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"JBCS 2.4.37 SP6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5639
Vulnerability from csaf_redhat - Published: 2020-12-21 12:01 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5639",
"url": "https://access.redhat.com/errata/RHSA-2020:5639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5639.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:33+00:00",
"generator": {
"date": "2024-11-22T15:56:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5639",
"initial_release_date": "2020-12-21T12:01:26+00:00",
"revision_history": [
{
"date": "2020-12-21T12:01:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:01:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-52.el7_2.src",
"product": {
"name": "openssl-1:1.0.1e-52.el7_2.src",
"product_id": "openssl-1:1.0.1e-52.el7_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-52.el7_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"product": {
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"product_id": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-52.el7_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.1e-52.el7_2.i686",
"product": {
"name": "openssl-static-1:1.0.1e-52.el7_2.i686",
"product_id": "openssl-static-1:1.0.1e-52.el7_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-52.el7_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.1e-52.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
},
"product_reference": "openssl-static-1:1.0.1e-52.el7_2.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:01:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5639"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.src",
"7Server-optional-7.2.AUS:openssl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-debuginfo-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-devel-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-libs-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-perl-1:1.0.1e-52.el7_2.x86_64",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.i686",
"7Server-optional-7.2.AUS:openssl-static-1:1.0.1e-52.el7_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5641
Vulnerability from csaf_redhat - Published: 2020-12-21 12:21 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5641",
"url": "https://access.redhat.com/errata/RHSA-2020:5641"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5641.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:49+00:00",
"generator": {
"date": "2024-11-22T15:56:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5641",
"initial_release_date": "2020-12-21T12:21:57+00:00",
"revision_history": [
{
"date": "2020-12-21T12:21:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:21:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-9.el7_4.src",
"product": {
"name": "openssl-1:1.0.2k-9.el7_4.src",
"product_id": "openssl-1:1.0.2k-9.el7_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-9.el7_4?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"product_id": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-9.el7_4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-9.el7_4.i686",
"product": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686",
"product_id": "openssl-static-1:1.0.2k-9.el7_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-9.el7_4?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"product_id": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-9.el7_4?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.i686",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-9.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-9.el7_4.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:21:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5641"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.AUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.AUS:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.E4S:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.ppc64le",
"7Server-optional-7.4.E4S:openssl-static-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.src",
"7Server-optional-7.4.TUS:openssl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-debuginfo-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-devel-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-libs-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-perl-1:1.0.2k-9.el7_4.x86_64",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.i686",
"7Server-optional-7.4.TUS:openssl-static-1:1.0.2k-9.el7_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5642
Vulnerability from csaf_redhat - Published: 2020-12-21 12:46 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5642",
"url": "https://access.redhat.com/errata/RHSA-2020:5642"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5642.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:57+00:00",
"generator": {
"date": "2024-11-22T15:56:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5642",
"initial_release_date": "2020-12-21T12:46:04+00:00",
"revision_history": [
{
"date": "2020-12-21T12:46:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-21T12:46:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-static-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"product_id": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-17.el7_6?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-17.el7_6.src",
"product": {
"name": "openssl-1:1.0.2k-17.el7_6.src",
"product_id": "openssl-1:1.0.2k-17.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-17.el7_6?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.src",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-17.el7_6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-17.el7_6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.6-EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-21T12:46:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5642"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7ComputeNode-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7ComputeNode-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-7.6.EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-7.6.EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.src",
"7Server-optional-Alt-7.6-EUS:openssl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-debuginfo-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-devel-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-libs-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-perl-1:1.0.2k-17.el7_6.x86_64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.i686",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.ppc64le",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.s390x",
"7Server-optional-Alt-7.6-EUS:openssl-static-1:1.0.2k-17.el7_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020:5623
Vulnerability from csaf_redhat - Published: 2020-12-17 17:01 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5623",
"url": "https://access.redhat.com/errata/RHSA-2020:5623"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5623.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:20+00:00",
"generator": {
"date": "2025-11-21T18:19:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5623",
"initial_release_date": "2020-12-17T17:01:47+00:00",
"revision_history": [
{
"date": "2020-12-17T17:01:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-17T17:01:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.src",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.src",
"product_id": "openssl-1:1.0.2k-20.el7_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.i686",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-static-1:1.0.2k-20.el7_7.s390",
"product": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390",
"product_id": "openssl-static-1:1.0.2k-20.el7_7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.2k-20.el7_7?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)",
"product_id": "7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7)",
"product_id": "7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)",
"product_id": "7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.src",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.i686",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-1:1.0.2k-20.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.7)",
"product_id": "7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
},
"product_reference": "openssl-static-1:1.0.2k-20.el7_7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-17T17:01:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5623"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7ComputeNode-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7ComputeNode-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.src",
"7Server-optional-7.7.EUS:openssl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-debuginfo-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-devel-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-libs-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-perl-1:1.0.2k-20.el7_7.x86_64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.i686",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.ppc64le",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.s390x",
"7Server-optional-7.7.EUS:openssl-static-1:1.0.2k-20.el7_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021_0494
Vulnerability from csaf_redhat - Published: 2021-02-11 13:51 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated Red Hat JBoss Web Server 5.4.1 packages are now available for Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.1 serves as a replacement for Red Hat JBoss Web Server 5.4.0, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: Apache Tomcat HTTP/2 Request mix-up (CVE-2020-13943)\n* tomcat: HTTP/2 request header mix-up (CVE-2020-17527)\n* tomcat: Information disclosure when using NTFS file system (CVE-2021-24122)\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0494",
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0494.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update",
"tracking": {
"current_release_date": "2024-11-22T15:56:20+00:00",
"generator": {
"date": "2024-11-22T15:56:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0494",
"initial_release_date": "2021-02-11T13:51:48+00:00",
"revision_history": [
{
"date": "2021-02-11T13:51:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:51:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el7jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el7jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el8jws?arch=src"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el8jws?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-3.redhat_3.el7jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_id": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.25-3.redhat_3.el8jws?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_id": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.25-3.redhat_3.el8jws?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_id": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.36-9.redhat_8.1.el7jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_id": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.36-9.redhat_8.1.el8jws?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 7 Server",
"product_id": "7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch"
},
"product_reference": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"relates_to_product_reference": "7Server-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src"
},
"product_reference": "jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64"
},
"product_reference": "jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.4 for RHEL 8",
"product_id": "8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
},
"product_reference": "jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"relates_to_product_reference": "8Base-JWS-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
},
{
"cve": "CVE-2020-13943",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1887648"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Apache Tomcat HTTP/2 Request mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management is using an affected version of Tomcat bundled within PKI servlet engine, however HTTP/2 protocol is not supported by this component.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13943"
},
{
"category": "external",
"summary": "RHBZ#1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13943",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13943"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38"
}
],
"release_date": "2020-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Apache Tomcat HTTP/2 Request mix-up"
},
{
"cve": "CVE-2020-17527",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1904221"
}
],
"notes": [
{
"category": "description",
"text": "While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: HTTP/2 request header mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management and Certificate System are using a vulnerable version of Tomcat that is bundled into the pki-servlet-engine component. However, HTTP/2 is not enabled in such a configuration, and it is not possible to trigger the flaw in a supported setup. A future update may fix the code.\n\nRed Hat Enterprise Linux 7\u0027s tomcat package, Identity Management, and Certificate System are all not affected by this flaw because HTTP/2 is not supported in the shipped version of tomcat in those packages.\n\ntomcat5 and tomcat6 in Red Hat Enterprise Linux 5 and 6 (respectively) are not affected by this flaw because HTTP/2 is not supported in the shipped versions of those packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-17527"
},
{
"category": "external",
"summary": "RHBZ#1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-17527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2020-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: HTTP/2 request header mix-up"
},
{
"cve": "CVE-2021-24122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1917209"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure when using NTFS file system",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat OpenStack Platform\u0027s OpenDaylight, tomcat is disabled by default. Further, ODL deployments are not supported on untrusted administrator networks; even if tomcat is enabled, if random users can access it, this would be in an unsupported configuration. For this reason, the RHOSP impact has been reduced and no update will be provided at this time for the ODL tomcat package.\n\nThis flaw does not affect tomcat or pki-servlet-engine as shipped with Red Hat Enterprise Linux 6, 7, or 8 because the functionality involving FindFirstFileW() is specific to the Windows native code. Additionally, RHEL is not shipped with NTFS support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-24122"
},
{
"category": "external",
"summary": "RHBZ#1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-24122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107",
"url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2021-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:48+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0494"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.src",
"7Server-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el7jws.x86_64",
"7Server-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"7Server-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el7jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-0:9.0.36-9.redhat_8.1.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-admin-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-docs-webapp-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-el-3.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-javadoc-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-jsp-2.3-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-lib-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.src",
"8Base-JWS-5.4:jws5-tomcat-native-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-native-debuginfo-0:1.2.25-3.redhat_3.el8jws.x86_64",
"8Base-JWS-5.4:jws5-tomcat-selinux-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-servlet-4.0-api-0:9.0.36-9.redhat_8.1.el8jws.noarch",
"8Base-JWS-5.4:jws5-tomcat-webapps-0:9.0.36-9.redhat_8.1.el8jws.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Information disclosure when using NTFS file system"
}
]
}
RHSA-2021_0495
Vulnerability from csaf_redhat - Published: 2021-02-11 13:51 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Web Server 5.4.1 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.4.1 serves as a replacement for Red Hat JBoss Web Server 5.4.0, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: Apache Tomcat HTTP/2 Request mix-up (CVE-2020-13943)\n* tomcat: HTTP/2 request header mix-up (CVE-2020-17527)\n* tomcat: Information disclosure when using NTFS file system (CVE-2021-24122)\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0495",
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=5.4",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=5.4"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/5.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/5.4/"
},
{
"category": "external",
"summary": "1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0495.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update",
"tracking": {
"current_release_date": "2024-11-22T15:56:29+00:00",
"generator": {
"date": "2024-11-22T15:56:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0495",
"initial_release_date": "2021-02-11T13:51:32+00:00",
"revision_history": [
{
"date": "2021-02-11T13:51:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:51:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 5",
"product": {
"name": "Red Hat JBoss Web Server 5",
"product_id": "Red Hat JBoss Web Server 5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"Red Hat JBoss Web Server 5"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
},
{
"cve": "CVE-2020-13943",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1887648"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Apache Tomcat HTTP/2 Request mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management is using an affected version of Tomcat bundled within PKI servlet engine, however HTTP/2 protocol is not supported by this component.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13943"
},
{
"category": "external",
"summary": "RHBZ#1887648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887648"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13943",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13943"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13943"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38"
}
],
"release_date": "2020-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Apache Tomcat HTTP/2 Request mix-up"
},
{
"cve": "CVE-2020-17527",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-12-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1904221"
}
],
"notes": [
{
"category": "description",
"text": "While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: HTTP/2 request header mix-up",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 8\u0027s Identity Management and Certificate System are using a vulnerable version of Tomcat that is bundled into the pki-servlet-engine component. However, HTTP/2 is not enabled in such a configuration, and it is not possible to trigger the flaw in a supported setup. A future update may fix the code.\n\nRed Hat Enterprise Linux 7\u0027s tomcat package, Identity Management, and Certificate System are all not affected by this flaw because HTTP/2 is not supported in the shipped version of tomcat in those packages.\n\ntomcat5 and tomcat6 in Red Hat Enterprise Linux 5 and 6 (respectively) are not affected by this flaw because HTTP/2 is not supported in the shipped versions of those packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-17527"
},
{
"category": "external",
"summary": "RHBZ#1904221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-17527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17527"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17527"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10",
"url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2020-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: HTTP/2 request header mix-up"
},
{
"cve": "CVE-2021-24122",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1917209"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Information disclosure when using NTFS file system",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat OpenStack Platform\u0027s OpenDaylight, tomcat is disabled by default. Further, ODL deployments are not supported on untrusted administrator networks; even if tomcat is enabled, if random users can access it, this would be in an unsupported configuration. For this reason, the RHOSP impact has been reduced and no update will be provided at this time for the ODL tomcat package.\n\nThis flaw does not affect tomcat or pki-servlet-engine as shipped with Red Hat Enterprise Linux 6, 7, or 8 because the functionality involving FindFirstFileW() is specific to the Windows native code. Additionally, RHEL is not shipped with NTFS support.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-24122"
},
{
"category": "external",
"summary": "RHBZ#1917209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-24122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24122"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122"
},
{
"category": "external",
"summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107",
"url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60",
"url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40",
"url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40"
}
],
"release_date": "2021-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:51:32+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0495"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat: Information disclosure when using NTFS file system"
}
]
}
RHSA-2020:5588
Vulnerability from csaf_redhat - Published: 2020-12-16 15:15 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5588",
"url": "https://access.redhat.com/errata/RHSA-2020:5588"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5588.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:17+00:00",
"generator": {
"date": "2025-11-21T18:19:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5588",
"initial_release_date": "2020-12-16T15:15:01+00:00",
"revision_history": [
{
"date": "2020-12-16T15:15:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-16T15:15:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1-9.el8_0.src",
"product": {
"name": "openssl-1:1.1.1-9.el8_0.src",
"product_id": "openssl-1:1.1.1-9.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1-9.el8_0?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-devel-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-devel-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-libs-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-libs-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1-9.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src"
},
"product_reference": "openssl-1:1.1.1-9.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-devel-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-libs-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-16T15:15:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5588"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5588
Vulnerability from csaf_redhat - Published: 2020-12-16 15:15 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5588",
"url": "https://access.redhat.com/errata/RHSA-2020:5588"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5588.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:09+00:00",
"generator": {
"date": "2024-11-22T15:56:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5588",
"initial_release_date": "2020-12-16T15:15:01+00:00",
"revision_history": [
{
"date": "2020-12-16T15:15:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-16T15:15:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1-9.el8_0.src",
"product": {
"name": "openssl-1:1.1.1-9.el8_0.src",
"product_id": "openssl-1:1.1.1-9.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1-9.el8_0?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1-9.el8_0?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1-9.el8_0?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-devel-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-devel-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-libs-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-libs-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1-9.el8_0?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1-9.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src"
},
"product_reference": "openssl-1:1.1.1-9.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-devel-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-libs-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1-9.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1-9.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1-9.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-16T15:15:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5588"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.src",
"BaseOS-8.0.0.Z.E4S:openssl-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-debugsource-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-devel-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.i686",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-libs-debuginfo-1:1.1.1-9.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:openssl-perl-1:1.1.1-9.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021_0949
Vulnerability from csaf_redhat - Published: 2021-03-22 10:10 - Updated: 2024-11-22 16:18It was discovered that the "setElementTypePrefix()" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.
An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
CWE-327 - Use of a Broken or Risky Cryptographic AlgorithmA use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
A flaw was found in dbus. The implementation of DBUS_COOKIE_SHA1 is susceptible to a symbolic link attack. A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause the DBusServer to read and write in unintended locations resulting in an authentication bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was discovered in ibus that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
It was discovered cpio does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
A reflected cross-site scripting (XSS) vulnerability was found in Python XML-RPC server. The `server_title` field is not sufficiently sanitized allowing malicious JavaScript to be injected. Successful exploitation would allow a remote attacker to execute JavaScript code within the context of the affected user.
A vulnerability was discovered in nss where input text length was not checked when using certain cryptographic primitives. This could lead to a heap-buffer overflow resulting in a crash and data leak. The highest threat is to confidentiality and integrity of data as well as system availability.
A protocol downgrade flaw was found in Network Security Services (NSS). After a HelloRetryRequest has been sent, the client may negotiate a lower protocol than TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
A vulnerability was discovered in glibc where the LD_PREFER_MAP_32BIT_EXEC environment variable is not ignored when running binaries with the setuid flag on x86_64 architectures. This allows an attacker to force system to utilize only half of the memory (making the system think the software is 32-bit only), thus lowering the amount of memory being used with address space layout randomization (ASLR). The highest threat is confidentiality although the complexity of attack is high. The affected application must already have other vulnerabilities for this flaw to be usable.
CWE-20 - Improper Input ValidationxmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
A memory leak was discovered in the systemd-login when a power-switch event is received. A physical attacker may trigger one of these events and leak bytes due to a missing free.
CWE-400 - Uncontrolled Resource ConsumptionA memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. System availability is the highest threat from this vulnerability.
A flaw was found in python. In Lib/tarfile.py an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of a buffer, resulting in a segmentation fault. The highest threat from this vulnerability is to system availability.
A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
A flaw was found in curl. Overwriting local files is possible when using a certain combination of command line options. Requesting content from a malicious server could lead to overwriting local files with compromised files leading to unknown effects. The highest threat from this vulnerability is to file integrity.
A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
A side-channel flaw was found in NSS, in the way P-384 and P-521 curves are used in the generation of EDSA signatures, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
A stack buffer overflow flaw was found in glibc in the way the printf family of functions processed an 80-bit long double with a non-canonical bit pattern. This flaw allows an attacker who can control the arguments of these functions with the non-standard long double pattern to trigger an overflow and cause an application crash. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated openshift/odo-init-image container image is now available for Red Hat Openshift Do 1.0.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Do (odo) is a simple CLI tool for developers to create,\nbuild, and deploy applications on OpenShift. The odo tool is completely\nclient-based and requires no server within the OpenShift cluster for\ndeployment. It detects changes to local code and deploys it to the cluster\nautomatically, giving instant feedback to validate changes in real-time. It\nsupports multiple programming languages and frameworks.\n\nRed Hat OpenShift Do openshift/odo-init-image 1.1.3 is a container image\nthat is used as part of the InitContainer setup that provisions odo\ncomponents.\n\nThe advisory addresses the following issues:\n\n* Re-release of odo-init-image 1.1.3 for security updates",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0949",
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/4.4/cli_reference/openshift_developer_cli/installing-odo.html",
"url": "https://docs.openshift.com/container-platform/4.4/cli_reference/openshift_developer_cli/installing-odo.html"
},
{
"category": "external",
"summary": "1832983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832983"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0949.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Do openshift/odo-init-image 1.1.3 security update",
"tracking": {
"current_release_date": "2024-11-22T16:18:07+00:00",
"generator": {
"date": "2024-11-22T16:18:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0949",
"initial_release_date": "2021-03-22T10:10:55+00:00",
"revision_history": [
{
"date": "2021-03-22T10:10:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-22T10:10:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:18:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Do 1",
"product": {
"name": "OpenShift Do 1",
"product_id": "7Server-RHODO-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_do:1.0::el7"
}
}
}
],
"category": "product_family",
"name": "OpenShift Do"
},
{
"branches": [
{
"category": "product_version",
"name": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"product": {
"name": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"product_id": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96?arch=amd64\u0026repository_url=registry.redhat.io/openshiftdo/odo-init-image-rhel7\u0026tag=1.1.3-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64 as a component of OpenShift Do 1",
"product_id": "7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
},
"product_reference": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"relates_to_product_reference": "7Server-RHODO-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-20843",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723723"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the \"setElementTypePrefix()\" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When processing a specially crafted XML file, expat may use more memory than ultimately necessary, which can also lead to increased CPU usage and longer processing times. Depending on available system resources and configuration, this may also lead to the application triggering the Out-Of-Memory-Killer, causing the application to be terminated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-20843"
},
{
"category": "external",
"summary": "RHBZ#1723723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843"
},
{
"category": "external",
"summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031"
}
],
"release_date": "2019-06-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS"
},
{
"cve": "CVE-2019-5094",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1768555"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "e2fsprogs: Crafted ext4 partition leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5094"
},
{
"category": "external",
"summary": "RHBZ#1768555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5094"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887"
}
],
"release_date": "2019-08-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "e2fsprogs: Crafted ext4 partition leads to out-of-bounds write"
},
{
"cve": "CVE-2019-5188",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2020-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1790048"
}
],
"notes": [
{
"category": "description",
"text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5188"
},
{
"category": "external",
"summary": "RHBZ#1790048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5188"
}
],
"release_date": "2020-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Thomas Vegas"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-5482",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1749652"
}
],
"notes": [
{
"category": "description",
"text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: heap buffer overflow in function tftp_receive_packet()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5482"
},
{
"category": "external",
"summary": "RHBZ#1749652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5482"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-5482.html",
"url": "https://curl.haxx.se/docs/CVE-2019-5482.html"
}
],
"release_date": "2019-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Do not use TFTP with curl with smaller than the default BLKSIZE.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: heap buffer overflow in function tftp_receive_packet()"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
},
{
"names": [
"Henry Corrigan-Gibbs"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-11719",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728436"
}
],
"notes": [
{
"category": "description",
"text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Out-of-bounds read when importing curve25519 private key",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox on Red Hat Enterprise Linux is built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11719"
},
{
"category": "external",
"summary": "RHBZ#1728436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11719"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719"
}
],
"release_date": "2019-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Out-of-bounds read when importing curve25519 private key"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
},
{
"names": [
"Hubert Kario"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-11727",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2019-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1730988"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: PKCS#1 v1.5 signatures can be used for TLS 1.3",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "RHBZ#1730988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11727",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11727"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727"
}
],
"release_date": "2019-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss: PKCS#1 v1.5 signatures can be used for TLS 1.3"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
}
],
"cve": "CVE-2019-11756",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1774835"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Use-after-free in sftk_FreeSession due to improper refcounting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was fixed in upstream nss-3.47. Exploitation of this flaw is difficult and even impossible in most cases.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11756"
},
{
"category": "external",
"summary": "RHBZ#1774835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774835"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11756"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes"
}
],
"release_date": "2019-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Use-after-free in sftk_FreeSession due to improper refcounting"
},
{
"cve": "CVE-2019-12450",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719141"
}
],
"notes": [
{
"category": "description",
"text": "file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of glib2 as shipped with Red Hat Enterprise Linux 6, 7 and 8 . Red Hat Product Security has rated this issue as having a security impact of Moderate.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-12450"
},
{
"category": "external",
"summary": "RHBZ#1719141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12450"
}
],
"release_date": "2019-05-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress"
},
{
"acknowledgments": [
{
"names": [
"the D-Bus project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-12749",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2019-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719344"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in dbus. The implementation of DBUS_COOKIE_SHA1 is susceptible to a symbolic link attack. A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause the DBusServer to read and write in unintended locations resulting in an authentication bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is mitigated by the fact that by default, the well-known system dbus-daemon (since 2003) and the well-known session dbus-daemon (in stable releases since dbus 1.10.0 in 2015) only accept the EXTERNAL authentication mechanism, and as a result will reject DBUS_COOKIE_SHA1 at an early stage, before manipulating cookies. \n\nRed Hat Enterprise Linux 6 is affected by this flaw, which can be leveraged to achieve privilege escalation via upstart. This issue has been rated as having important impact for Red Hat Enterprise Linux 6.\n\nRed Hat Enterprise Linux 7 and 8, both ship dbus \u003e= 1.10 and therefore are affected by this flaw only when system or session dbus-daemons are used under non-standard configurations or by third party users of DBusServer. Red Hat Enterprise Linux 7 and 8 does not ship any affected DBusServer cosumer. However third party applications may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-12749"
},
{
"category": "external",
"summary": "RHBZ#1719344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12749"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/11/2",
"url": "https://www.openwall.com/lists/oss-security/2019/06/11/2"
}
],
"release_date": "2019-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass"
},
{
"acknowledgments": [
{
"names": [
"Simon McVittie"
],
"organization": "Collabora Ltd."
}
],
"cve": "CVE-2019-14822",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2019-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1717958"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in ibus that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ibus: missing authorization allows local attacker to access the input bus of another user",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Gnome uses the ibus input framework only when the user explicitly configures it or when some input method sources are in use, like Korean from the ibus-hangul package or Chinese input methods from the ibus-libpinyin. Input methods like en-US are not handled by ibus, thus if the victim user just use them the attacker will not be able to intercept the key strokes of that user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14822"
},
{
"category": "external",
"summary": "RHBZ#1717958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14822",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14822"
}
],
"release_date": "2019-09-13T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ibus: missing authorization allows local attacker to access the input bus of another user"
},
{
"acknowledgments": [
{
"names": [
"Thomas Habets"
]
}
],
"cve": "CVE-2019-14866",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2019-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1765511"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered cpio does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpio: improper input validation when writing tar header fields leads to unexpected tar generation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14866"
},
{
"category": "external",
"summary": "RHBZ#1765511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14866"
}
],
"release_date": "2019-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "TAR archives should be inspected before being extracted and the extraction should be performed with the `tar` command or `--no-absolute-filenames` option if done with `cpio`. Moreover, it should be performed by a low-privilege user whenever possible, to prevent extraction of files that could compromise the system.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpio: improper input validation when writing tar header fields leads to unexpected tar generation"
},
{
"cve": "CVE-2019-15903",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1752592"
}
],
"notes": [
{
"category": "description",
"text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: heap-based buffer over-read via crafted XML input",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15903"
},
{
"category": "external",
"summary": "RHBZ#1752592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903"
}
],
"release_date": "2019-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "expat: heap-based buffer over-read via crafted XML input"
},
{
"cve": "CVE-2019-16935",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2019-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1763229"
}
],
"notes": [
{
"category": "description",
"text": "A reflected cross-site scripting (XSS) vulnerability was found in Python XML-RPC server. The `server_title` field is not sufficiently sanitized allowing malicious JavaScript to be injected. Successful exploitation would allow a remote attacker to execute JavaScript code within the context of the affected user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: XSS vulnerability in the documentation XML-RPC server in server_title field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect the versions of python27-python as shipped with Red Hat Software Collections 3 as they already include the fix.\nThis flaw does not affect the versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 as they are \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16935"
},
{
"category": "external",
"summary": "RHBZ#1763229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763229"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16935"
}
],
"release_date": "2019-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: XSS vulnerability in the documentation XML-RPC server in server_title field"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
}
],
"cve": "CVE-2019-17006",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-11-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1775916"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in nss where input text length was not checked when using certain cryptographic primitives. This could lead to a heap-buffer overflow resulting in a crash and data leak. The highest threat is to confidentiality and integrity of data as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Check length of inputs for cryptographic primitives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17006"
},
{
"category": "external",
"summary": "RHBZ#1775916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17006"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes"
}
],
"release_date": "2019-12-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Check length of inputs for cryptographic primitives"
},
{
"cve": "CVE-2019-17023",
"discovery_date": "2020-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1791225"
}
],
"notes": [
{
"category": "description",
"text": "A protocol downgrade flaw was found in Network Security Services (NSS). After a HelloRetryRequest has been sent, the client may negotiate a lower protocol than TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw causes the client to hang when there is a downgrade attempt. Therefore no actual protocol downgrade occurs.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17023"
},
{
"category": "external",
"summary": "RHBZ#1791225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791225"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17023"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes"
}
],
"release_date": "2020-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state"
},
{
"cve": "CVE-2019-17498",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1766898"
}
],
"notes": [
{
"category": "description",
"text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw needs a malicious MITM SSH server. When an application compiled with libssh2 connects to such a MITM SSH server, the server can trigger an integer overflow leading to an OOB read in the SSH_MSG_DISCONNECT logic. This can cause the application compiled with libssh2 to crash. This is strictly a client side crash and the SSH server may not be affected.\n\nAlso note that when a user connects to a malicious MITM server there is already a risk of disclosing password/keys irrespective of the flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17498"
},
{
"category": "external",
"summary": "RHBZ#1766898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17498"
},
{
"category": "external",
"summary": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/",
"url": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/"
}
],
"release_date": "2019-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c"
},
{
"cve": "CVE-2019-19126",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2019-11-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1774681"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in glibc where the LD_PREFER_MAP_32BIT_EXEC environment variable is not ignored when running binaries with the setuid flag on x86_64 architectures. This allows an attacker to force system to utilize only half of the memory (making the system think the software is 32-bit only), thus lowering the amount of memory being used with address space layout randomization (ASLR). The highest threat is confidentiality although the complexity of attack is high. The affected application must already have other vulnerabilities for this flaw to be usable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19126"
},
{
"category": "external",
"summary": "RHBZ#1774681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19126"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126"
}
],
"release_date": "2019-11-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries"
},
{
"cve": "CVE-2019-19956",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2020-01-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1788856"
}
],
"notes": [
{
"category": "description",
"text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19956"
},
{
"category": "external",
"summary": "RHBZ#1788856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19956",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956"
}
],
"release_date": "2020-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c"
},
{
"cve": "CVE-2019-20386",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-01-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1793979"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak was discovered in the systemd-login when a power-switch event is received. A physical attacker may trigger one of these events and leak bytes due to a missing free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: memory leak in button_open() in login/logind-button.c when udev events are received",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The version of systemd delivered in OpenShift Container Platform 4.1 and included in CoreOS images has been superseded by the version delivered in Red Hat Enterprise Linux 8. CoreOS updates for systemd in will be consumed from Red Hat Enterprise Linux 8 channels.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20386"
},
{
"category": "external",
"summary": "RHBZ#1793979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20386"
}
],
"release_date": "2020-01-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 2.4,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "systemd: memory leak in button_open() in login/logind-button.c when udev events are received"
},
{
"cve": "CVE-2019-20388",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1799734"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. System availability is the highest threat from this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20388"
},
{
"category": "external",
"summary": "RHBZ#1799734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388"
}
],
"release_date": "2020-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c"
},
{
"cve": "CVE-2019-20907",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856481"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in python. In Lib/tarfile.py an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: infinite loop in the tarfile module via crafted TAR archive",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A service is vulnerable if it uses python\u0027s tarfile module to open untrusted tar files. If an attacker is able to submit a crafted tar file to a service which uses the tarfile module to open it, an infinite loop will be executed, potentially causing a denial of service. The tarfile module is included with python.\n\nVersions of `python36:3.6/python36` as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main `python3` component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "RHBZ#1856481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856481"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20907"
}
],
"release_date": "2019-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by not opening untrusted files with tarfile.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: infinite loop in the tarfile module via crafted TAR archive"
},
{
"cve": "CVE-2019-25013",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912960"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of a buffer, resulting in a segmentation fault. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having moderate impact for glibc packages shipped with Red Hat Enterprise Linux because, the maximum impact of this vulnerability is a crash, and it relies on processing untrusted input in an uncommon encoding (EUC-KR). When this encoding is not used, the vulnerability can not be triggered.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-25013"
},
{
"category": "external",
"summary": "RHBZ#1912960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-25013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25013"
}
],
"release_date": "2019-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Cesar Pereida",
"Nicola Tuveri",
"Yuval Yarom",
"Billy Bob Brumley"
],
"organization": "Network and Information Security Group (NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-6829",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1826187"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Side channel attack on ECDSA signature generation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a side channel attack which can used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-6829"
},
{
"category": "external",
"summary": "RHBZ#1826187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6829"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-06-02T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Side channel attack on ECDSA signature generation"
},
{
"cve": "CVE-2020-7595",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1799786"
}
],
"notes": [
{
"category": "description",
"text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7595"
},
{
"category": "external",
"summary": "RHBZ#1799786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595"
}
],
"release_date": "2020-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations"
},
{
"cve": "CVE-2020-8177",
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1847915"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. Overwriting local files is possible when using a certain combination of command line options. Requesting content from a malicious server could lead to overwriting local files with compromised files leading to unknown effects. The highest threat from this vulnerability is to file integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Incorrect argument check can allow remote servers to overwrite local files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects the \u0027curl\u0027 command line utility. Additionally, this is only an issue when using the \u0027-J\u0027 (with the \u0027-O\u0027 option) and \u0027-i\u0027 command line options combined.\n\nIn most cases, there is nothing to gain for a local attacker here: the curl command line utility is likely running with the same privileges as the user, and thus the user can already overwrite all the files curl could overwrite. However, a local user will have to call curl with the \u0027-J\u0027 and \u0027-i\u0027 command line options while requesting content from a malicious server, which then opens up an opportunity for the malicious server to overwrite local files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8177"
},
{
"category": "external",
"summary": "RHBZ#1847915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2020-8177.html",
"url": "https://curl.haxx.se/docs/CVE-2020-8177.html"
}
],
"release_date": "2020-06-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "The vulnerability is only possible when using the \u0027-J\u0027 and \u0027-i\u0027 switches in conjunction with the curl command. Executing curl without these switches mitigates the flaw.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Incorrect argument check can allow remote servers to overwrite local files"
},
{
"cve": "CVE-2020-10029",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2020-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1810670"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The glibc version shipped with Red Hat Enterprise Linux 8 is compiled using gcc\u0027s stack-protector option which mitigates the possibility of code execution led by the stack corruption.\n\nThe glibc version shipped with Red Hat Enterprise Linux 7 is more difficult to exploit using this flaw, specifically for remote code execution. Because exploitation of the flaw depends on the usage of pseudo-zero values, an attacker can only overwrite the stack with 0s. Due to this, a valid address value for code execution is difficult to get and is likely to only result in a crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10029"
},
{
"category": "external",
"summary": "RHBZ#1810670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10029"
}
],
"release_date": "2020-02-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions"
},
{
"cve": "CVE-2020-12243",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-04-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1833535"
}
],
"notes": [
{
"category": "description",
"text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openldap: denial of service via nested boolean expressions in LDAP search filters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 8 because we don\u0027t ship openldap-servers subpackage with the Red Hat Enterprise Linux 8 (it is only present in the buildroot).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12243"
},
{
"category": "external",
"summary": "RHBZ#1833535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833535"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12243",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12243"
}
],
"release_date": "2020-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openldap: denial of service via nested boolean expressions in LDAP search filters"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Cesar Pereida Garcia and the Network and Information Security Group"
],
"organization": "NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-12400",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-07-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853983"
}
],
"notes": [
{
"category": "description",
"text": "A side-channel flaw was found in NSS, in the way P-384 and P-521 curves are used in the generation of EDSA signatures, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a side-channel attack that can be used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12400"
},
{
"category": "external",
"summary": "RHBZ#1853983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853983"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12400",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12400"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Cesar Pereida Garcia and the Network and Information Security Group"
],
"organization": "NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-12401",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1851294"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: ECDSA timing attack mitigation bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a side channel attack which can used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12401"
},
{
"category": "external",
"summary": "RHBZ#1851294",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851294"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12401"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "This is a side channel attack which can used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: ECDSA timing attack mitigation bypass"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Billy Bob Brumley",
"Cesar Pereida",
"Nicola Tuveri",
"Yuval Yarom"
],
"organization": "Network and Information Security Group (NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-12402",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1826231"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Side channel vulnerabilities during RSA key generation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A timing attack was found in the way NSS generated RSA keys. A man-in-the-middle attacker could use this attack during RSA key generation to recover the private key. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12402"
},
{
"category": "external",
"summary": "RHBZ#1826231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826231"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12402"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes"
}
],
"release_date": "2020-06-02T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Side channel vulnerabilities during RSA key generation"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
}
],
"cve": "CVE-2020-12403",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-08-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1868931"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12403"
},
{
"category": "external",
"summary": "RHBZ#1868931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12403",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12403"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read"
},
{
"cve": "CVE-2020-29573",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2020-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1905213"
}
],
"notes": [
{
"category": "description",
"text": "A stack buffer overflow flaw was found in glibc in the way the printf family of functions processed an 80-bit long double with a non-canonical bit pattern. This flaw allows an attacker who can control the arguments of these functions with the non-standard long double pattern to trigger an overflow and cause an application crash. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is essentially a crash which can only be triggered by a non-standard argument passed as a long double input to a member of printf family of functions. The application has to be written in this way to allow this issue to be triggered. The maximum impact is an application crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29573"
},
{
"category": "external",
"summary": "RHBZ#1905213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905213"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29573"
},
{
"category": "external",
"summary": "https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html",
"url": "https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html"
}
],
"release_date": "2020-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern"
}
]
}
RHSA-2021_0491
Vulnerability from csaf_redhat - Published: 2021-02-11 13:39 - Updated: 2024-11-22 15:56A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1, for RHEL 7 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 11 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0491",
"url": "https://access.redhat.com/errata/RHSA-2021:0491"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0491.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 11 security update",
"tracking": {
"current_release_date": "2024-11-22T15:56:43+00:00",
"generator": {
"date": "2024-11-22T15:56:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0491",
"initial_release_date": "2021-02-11T13:39:36+00:00",
"revision_history": [
{
"date": "2021-02-11T13:39:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:39:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:56:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1",
"product": {
"name": "Red Hat JBoss Web Server 3.1",
"product_id": "Red Hat JBoss Web Server 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:39:36+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0491"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2020_5422
Vulnerability from csaf_redhat - Published: 2020-12-15 09:04 - Updated: 2024-11-22 15:55A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5422",
"url": "https://access.redhat.com/errata/RHSA-2020:5422"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5422.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:55:54+00:00",
"generator": {
"date": "2024-11-22T15:55:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5422",
"initial_release_date": "2020-12-15T09:04:53+00:00",
"revision_history": [
{
"date": "2020-12-15T09:04:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T09:04:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:55:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.src",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.src",
"product_id": "openssl-1:1.1.1c-16.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1c-16.el8_2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1c-16.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1c-16.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T09:04:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5422"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.src",
"BaseOS-8.2.0.Z.EUS:openssl-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-debugsource-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-devel-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-libs-debuginfo-1:1.1.1c-16.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:openssl-perl-1:1.1.1c-16.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021_0056
Vulnerability from csaf_redhat - Published: 2021-01-11 10:34 - Updated: 2024-11-22 15:55A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0056",
"url": "https://access.redhat.com/errata/RHSA-2021:0056"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0056.json"
}
],
"title": "Red Hat Security Advisory: openssl security update",
"tracking": {
"current_release_date": "2024-11-22T15:55:58+00:00",
"generator": {
"date": "2024-11-22T15:55:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:0056",
"initial_release_date": "2021-01-11T10:34:05+00:00",
"revision_history": [
{
"date": "2021-01-11T10:34:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-01-11T10:34:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:55:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.src",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.src",
"product_id": "openssl-0:1.0.1e-59.el6_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.s390",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.s390",
"product_id": "openssl-0:1.0.1e-59.el6_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-59.el6_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"product": {
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"product_id": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-59.el6_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-59.el6_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"product": {
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"product_id": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-59.el6_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-59.el6_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "openssl-static-0:1.0.1e-59.el6_10.i686",
"product": {
"name": "openssl-static-0:1.0.1e-59.el6_10.i686",
"product_id": "openssl-static-0:1.0.1e-59.el6_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-static@1.0.1e-59.el6_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.src"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-static-0:1.0.1e-59.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
},
"product_reference": "openssl-static-0:1.0.1e-59.el6_10.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-01-11T10:34:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0056"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.src",
"6Server-optional-ELS:openssl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-debuginfo-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-devel-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-perl-0:1.0.1e-59.el6_10.x86_64",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.i686",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.s390x",
"6Server-optional-ELS:openssl-static-0:1.0.1e-59.el6_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0949
Vulnerability from csaf_redhat - Published: 2021-03-22 10:10 - Updated: 2026-03-21 00:57It was discovered that the "setElementTypePrefix()" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.
An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
CWE-327 - Use of a Broken or Risky Cryptographic AlgorithmA use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
A flaw was found in dbus. The implementation of DBUS_COOKIE_SHA1 is susceptible to a symbolic link attack. A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause the DBusServer to read and write in unintended locations resulting in an authentication bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was discovered in ibus that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
It was discovered cpio does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
A reflected cross-site scripting (XSS) vulnerability was found in Python XML-RPC server. The `server_title` field is not sufficiently sanitized allowing malicious JavaScript to be injected. Successful exploitation would allow a remote attacker to execute JavaScript code within the context of the affected user.
A vulnerability was discovered in nss where input text length was not checked when using certain cryptographic primitives. This could lead to a heap-buffer overflow resulting in a crash and data leak. The highest threat is to confidentiality and integrity of data as well as system availability.
A protocol downgrade flaw was found in Network Security Services (NSS). After a HelloRetryRequest has been sent, the client may negotiate a lower protocol than TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
A vulnerability was discovered in glibc where the LD_PREFER_MAP_32BIT_EXEC environment variable is not ignored when running binaries with the setuid flag on x86_64 architectures. This allows an attacker to force system to utilize only half of the memory (making the system think the software is 32-bit only), thus lowering the amount of memory being used with address space layout randomization (ASLR). The highest threat is confidentiality although the complexity of attack is high. The affected application must already have other vulnerabilities for this flaw to be usable.
CWE-20 - Improper Input ValidationxmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
A memory leak was discovered in the systemd-login when a power-switch event is received. A physical attacker may trigger one of these events and leak bytes due to a missing free.
CWE-400 - Uncontrolled Resource ConsumptionA memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. System availability is the highest threat from this vulnerability.
A flaw was found in python. In Lib/tarfile.py an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of a buffer, resulting in a segmentation fault. The highest threat from this vulnerability is to system availability.
A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
A flaw was found in curl. Overwriting local files is possible when using a certain combination of command line options. Requesting content from a malicious server could lead to overwriting local files with compromised files leading to unknown effects. The highest threat from this vulnerability is to file integrity.
A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
A side-channel flaw was found in NSS, in the way P-384 and P-521 curves are used in the generation of EDSA signatures, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.
A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
A stack buffer overflow flaw was found in glibc in the way the printf family of functions processed an 80-bit long double with a non-canonical bit pattern. This flaw allows an attacker who can control the arguments of these functions with the non-standard long double pattern to trigger an overflow and cause an application crash. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated openshift/odo-init-image container image is now available for Red Hat Openshift Do 1.0.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Do (odo) is a simple CLI tool for developers to create,\nbuild, and deploy applications on OpenShift. The odo tool is completely\nclient-based and requires no server within the OpenShift cluster for\ndeployment. It detects changes to local code and deploys it to the cluster\nautomatically, giving instant feedback to validate changes in real-time. It\nsupports multiple programming languages and frameworks.\n\nRed Hat OpenShift Do openshift/odo-init-image 1.1.3 is a container image\nthat is used as part of the InitContainer setup that provisions odo\ncomponents.\n\nThe advisory addresses the following issues:\n\n* Re-release of odo-init-image 1.1.3 for security updates",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0949",
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/4.4/cli_reference/openshift_developer_cli/installing-odo.html",
"url": "https://docs.openshift.com/container-platform/4.4/cli_reference/openshift_developer_cli/installing-odo.html"
},
{
"category": "external",
"summary": "1832983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832983"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0949.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Do openshift/odo-init-image 1.1.3 security update",
"tracking": {
"current_release_date": "2026-03-21T00:57:35+00:00",
"generator": {
"date": "2026-03-21T00:57:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2021:0949",
"initial_release_date": "2021-03-22T10:10:55+00:00",
"revision_history": [
{
"date": "2021-03-22T10:10:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-03-22T10:10:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-21T00:57:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Do 1",
"product": {
"name": "OpenShift Do 1",
"product_id": "7Server-RHODO-1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_do:1.0::el7"
}
}
}
],
"category": "product_family",
"name": "OpenShift Do"
},
{
"branches": [
{
"category": "product_version",
"name": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"product": {
"name": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"product_id": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96?arch=amd64\u0026repository_url=registry.redhat.io/openshiftdo/odo-init-image-rhel7\u0026tag=1.1.3-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64 as a component of OpenShift Do 1",
"product_id": "7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
},
"product_reference": "openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64",
"relates_to_product_reference": "7Server-RHODO-1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-20843",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723723"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the \"setElementTypePrefix()\" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When processing a specially crafted XML file, expat may use more memory than ultimately necessary, which can also lead to increased CPU usage and longer processing times. Depending on available system resources and configuration, this may also lead to the application triggering the Out-Of-Memory-Killer, causing the application to be terminated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-20843"
},
{
"category": "external",
"summary": "RHBZ#1723723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843"
},
{
"category": "external",
"summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031"
}
],
"release_date": "2019-06-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS"
},
{
"cve": "CVE-2019-5094",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1768555"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "e2fsprogs: Crafted ext4 partition leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5094"
},
{
"category": "external",
"summary": "RHBZ#1768555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5094"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887"
}
],
"release_date": "2019-08-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "e2fsprogs: Crafted ext4 partition leads to out-of-bounds write"
},
{
"cve": "CVE-2019-5188",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2020-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1790048"
}
],
"notes": [
{
"category": "description",
"text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5188"
},
{
"category": "external",
"summary": "RHBZ#1790048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5188"
}
],
"release_date": "2020-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "e2fsprogs: Out-of-bounds write in e2fsck/rehash.c"
},
{
"acknowledgments": [
{
"names": [
"the Curl project"
]
},
{
"names": [
"Thomas Vegas"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-5482",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1749652"
}
],
"notes": [
{
"category": "description",
"text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: heap buffer overflow in function tftp_receive_packet()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5482"
},
{
"category": "external",
"summary": "RHBZ#1749652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5482"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2019-5482.html",
"url": "https://curl.haxx.se/docs/CVE-2019-5482.html"
}
],
"release_date": "2019-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Do not use TFTP with curl with smaller than the default BLKSIZE.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: heap buffer overflow in function tftp_receive_packet()"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
},
{
"names": [
"Henry Corrigan-Gibbs"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-11719",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1728436"
}
],
"notes": [
{
"category": "description",
"text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Out-of-bounds read when importing curve25519 private key",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Firefox on Red Hat Enterprise Linux is built against the system nss library.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11719"
},
{
"category": "external",
"summary": "RHBZ#1728436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11719"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719"
}
],
"release_date": "2019-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Out-of-bounds read when importing curve25519 private key"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
},
{
"names": [
"Hubert Kario"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-11727",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2019-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1730988"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: PKCS#1 v1.5 signatures can be used for TLS 1.3",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "RHBZ#1730988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11727",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11727"
},
{
"category": "external",
"summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727"
}
],
"release_date": "2019-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss: PKCS#1 v1.5 signatures can be used for TLS 1.3"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla project"
]
}
],
"cve": "CVE-2019-11756",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1774835"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in Mozilla Network Security Services (NSS) related to PK11 session handling. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled with NSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Use-after-free in sftk_FreeSession due to improper refcounting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was fixed in upstream nss-3.47. Exploitation of this flaw is difficult and even impossible in most cases.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11756"
},
{
"category": "external",
"summary": "RHBZ#1774835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774835"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11756"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes"
}
],
"release_date": "2019-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Use-after-free in sftk_FreeSession due to improper refcounting"
},
{
"cve": "CVE-2019-12450",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719141"
}
],
"notes": [
{
"category": "description",
"text": "file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of glib2 as shipped with Red Hat Enterprise Linux 6, 7 and 8 . Red Hat Product Security has rated this issue as having a security impact of Moderate.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-12450"
},
{
"category": "external",
"summary": "RHBZ#1719141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12450"
}
],
"release_date": "2019-05-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress"
},
{
"acknowledgments": [
{
"names": [
"the D-Bus project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-12749",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2019-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719344"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in dbus. The implementation of DBUS_COOKIE_SHA1 is susceptible to a symbolic link attack. A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause the DBusServer to read and write in unintended locations resulting in an authentication bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is mitigated by the fact that by default, the well-known system dbus-daemon (since 2003) and the well-known session dbus-daemon (in stable releases since dbus 1.10.0 in 2015) only accept the EXTERNAL authentication mechanism, and as a result will reject DBUS_COOKIE_SHA1 at an early stage, before manipulating cookies. \n\nRed Hat Enterprise Linux 6 is affected by this flaw, which can be leveraged to achieve privilege escalation via upstart. This issue has been rated as having important impact for Red Hat Enterprise Linux 6.\n\nRed Hat Enterprise Linux 7 and 8, both ship dbus \u003e= 1.10 and therefore are affected by this flaw only when system or session dbus-daemons are used under non-standard configurations or by third party users of DBusServer. Red Hat Enterprise Linux 7 and 8 does not ship any affected DBusServer cosumer. However third party applications may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-12749"
},
{
"category": "external",
"summary": "RHBZ#1719344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12749"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/11/2",
"url": "https://www.openwall.com/lists/oss-security/2019/06/11/2"
}
],
"release_date": "2019-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass"
},
{
"acknowledgments": [
{
"names": [
"Simon McVittie"
],
"organization": "Collabora Ltd."
}
],
"cve": "CVE-2019-14822",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2019-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1717958"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in ibus that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ibus: missing authorization allows local attacker to access the input bus of another user",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Gnome uses the ibus input framework only when the user explicitly configures it or when some input method sources are in use, like Korean from the ibus-hangul package or Chinese input methods from the ibus-libpinyin. Input methods like en-US are not handled by ibus, thus if the victim user just use them the attacker will not be able to intercept the key strokes of that user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14822"
},
{
"category": "external",
"summary": "RHBZ#1717958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14822",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14822"
}
],
"release_date": "2019-09-13T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ibus: missing authorization allows local attacker to access the input bus of another user"
},
{
"acknowledgments": [
{
"names": [
"Thomas Habets"
]
}
],
"cve": "CVE-2019-14866",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2019-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1765511"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered cpio does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpio: improper input validation when writing tar header fields leads to unexpected tar generation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14866"
},
{
"category": "external",
"summary": "RHBZ#1765511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14866"
}
],
"release_date": "2019-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "TAR archives should be inspected before being extracted and the extraction should be performed with the `tar` command or `--no-absolute-filenames` option if done with `cpio`. Moreover, it should be performed by a low-privilege user whenever possible, to prevent extraction of files that could compromise the system.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpio: improper input validation when writing tar header fields leads to unexpected tar generation"
},
{
"cve": "CVE-2019-15903",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2019-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1752592"
}
],
"notes": [
{
"category": "description",
"text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: heap-based buffer over-read via crafted XML input",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15903"
},
{
"category": "external",
"summary": "RHBZ#1752592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903"
}
],
"release_date": "2019-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "expat: heap-based buffer over-read via crafted XML input"
},
{
"cve": "CVE-2019-16935",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2019-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1763229"
}
],
"notes": [
{
"category": "description",
"text": "A reflected cross-site scripting (XSS) vulnerability was found in Python XML-RPC server. The `server_title` field is not sufficiently sanitized allowing malicious JavaScript to be injected. Successful exploitation would allow a remote attacker to execute JavaScript code within the context of the affected user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: XSS vulnerability in the documentation XML-RPC server in server_title field",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect the versions of python27-python as shipped with Red Hat Software Collections 3 as they already include the fix.\nThis flaw does not affect the versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 as they are \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16935"
},
{
"category": "external",
"summary": "RHBZ#1763229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763229"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16935"
}
],
"release_date": "2019-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: XSS vulnerability in the documentation XML-RPC server in server_title field"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
}
],
"cve": "CVE-2019-17006",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-11-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1775916"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in nss where input text length was not checked when using certain cryptographic primitives. This could lead to a heap-buffer overflow resulting in a crash and data leak. The highest threat is to confidentiality and integrity of data as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Check length of inputs for cryptographic primitives",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17006"
},
{
"category": "external",
"summary": "RHBZ#1775916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17006"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes"
}
],
"release_date": "2019-12-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Check length of inputs for cryptographic primitives"
},
{
"cve": "CVE-2019-17023",
"discovery_date": "2020-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1791225"
}
],
"notes": [
{
"category": "description",
"text": "A protocol downgrade flaw was found in Network Security Services (NSS). After a HelloRetryRequest has been sent, the client may negotiate a lower protocol than TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw causes the client to hang when there is a downgrade attempt. Therefore no actual protocol downgrade occurs.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17023"
},
{
"category": "external",
"summary": "RHBZ#1791225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791225"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17023"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes"
}
],
"release_date": "2020-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state"
},
{
"cve": "CVE-2019-17498",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-10-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1766898"
}
],
"notes": [
{
"category": "description",
"text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw needs a malicious MITM SSH server. When an application compiled with libssh2 connects to such a MITM SSH server, the server can trigger an integer overflow leading to an OOB read in the SSH_MSG_DISCONNECT logic. This can cause the application compiled with libssh2 to crash. This is strictly a client side crash and the SSH server may not be affected.\n\nAlso note that when a user connects to a malicious MITM server there is already a risk of disclosing password/keys irrespective of the flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-17498"
},
{
"category": "external",
"summary": "RHBZ#1766898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17498"
},
{
"category": "external",
"summary": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/",
"url": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/"
}
],
"release_date": "2019-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c"
},
{
"cve": "CVE-2019-19126",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2019-11-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1774681"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in glibc where the LD_PREFER_MAP_32BIT_EXEC environment variable is not ignored when running binaries with the setuid flag on x86_64 architectures. This allows an attacker to force system to utilize only half of the memory (making the system think the software is 32-bit only), thus lowering the amount of memory being used with address space layout randomization (ASLR). The highest threat is confidentiality although the complexity of attack is high. The affected application must already have other vulnerabilities for this flaw to be usable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19126"
},
{
"category": "external",
"summary": "RHBZ#1774681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774681"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19126"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19126"
}
],
"release_date": "2019-11-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries"
},
{
"cve": "CVE-2019-19956",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2020-01-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1788856"
}
],
"notes": [
{
"category": "description",
"text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-19956"
},
{
"category": "external",
"summary": "RHBZ#1788856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-19956",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956"
}
],
"release_date": "2020-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c"
},
{
"cve": "CVE-2019-20386",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-01-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1793979"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak was discovered in the systemd-login when a power-switch event is received. A physical attacker may trigger one of these events and leak bytes due to a missing free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: memory leak in button_open() in login/logind-button.c when udev events are received",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The version of systemd delivered in OpenShift Container Platform 4.1 and included in CoreOS images has been superseded by the version delivered in Red Hat Enterprise Linux 8. CoreOS updates for systemd in will be consumed from Red Hat Enterprise Linux 8 channels.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20386"
},
{
"category": "external",
"summary": "RHBZ#1793979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20386"
}
],
"release_date": "2020-01-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 2.4,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "systemd: memory leak in button_open() in login/logind-button.c when udev events are received"
},
{
"cve": "CVE-2019-20388",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1799734"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. System availability is the highest threat from this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20388"
},
{
"category": "external",
"summary": "RHBZ#1799734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388"
}
],
"release_date": "2020-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c"
},
{
"cve": "CVE-2019-20907",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1856481"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in python. In Lib/tarfile.py an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: infinite loop in the tarfile module via crafted TAR archive",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A service is vulnerable if it uses python\u0027s tarfile module to open untrusted tar files. If an attacker is able to submit a crafted tar file to a service which uses the tarfile module to open it, an infinite loop will be executed, potentially causing a denial of service. The tarfile module is included with python.\n\nVersions of `python36:3.6/python36` as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main `python3` component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "RHBZ#1856481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856481"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20907"
}
],
"release_date": "2019-12-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "This flaw can be mitigated by not opening untrusted files with tarfile.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: infinite loop in the tarfile module via crafted TAR archive"
},
{
"cve": "CVE-2019-25013",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912960"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of a buffer, resulting in a segmentation fault. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having moderate impact for glibc packages shipped with Red Hat Enterprise Linux because, the maximum impact of this vulnerability is a crash, and it relies on processing untrusted input in an uncommon encoding (EUC-KR). When this encoding is not used, the vulnerability can not be triggered.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-25013"
},
{
"category": "external",
"summary": "RHBZ#1912960",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912960"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-25013",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25013"
}
],
"release_date": "2019-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding"
},
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Cesar Pereida",
"Nicola Tuveri",
"Yuval Yarom",
"Billy Bob Brumley"
],
"organization": "Network and Information Security Group (NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-6829",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1826187"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Side channel attack on ECDSA signature generation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a side channel attack which can used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-6829"
},
{
"category": "external",
"summary": "RHBZ#1826187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6829"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-06-02T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Side channel attack on ECDSA signature generation"
},
{
"cve": "CVE-2020-7595",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1799786"
}
],
"notes": [
{
"category": "description",
"text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-7595"
},
{
"category": "external",
"summary": "RHBZ#1799786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595"
}
],
"release_date": "2020-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations"
},
{
"cve": "CVE-2020-8177",
"discovery_date": "2020-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1847915"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl. Overwriting local files is possible when using a certain combination of command line options. Requesting content from a malicious server could lead to overwriting local files with compromised files leading to unknown effects. The highest threat from this vulnerability is to file integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: Incorrect argument check can allow remote servers to overwrite local files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects the \u0027curl\u0027 command line utility. Additionally, this is only an issue when using the \u0027-J\u0027 (with the \u0027-O\u0027 option) and \u0027-i\u0027 command line options combined.\n\nIn most cases, there is nothing to gain for a local attacker here: the curl command line utility is likely running with the same privileges as the user, and thus the user can already overwrite all the files curl could overwrite. However, a local user will have to call curl with the \u0027-J\u0027 and \u0027-i\u0027 command line options while requesting content from a malicious server, which then opens up an opportunity for the malicious server to overwrite local files.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8177"
},
{
"category": "external",
"summary": "RHBZ#1847915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177"
},
{
"category": "external",
"summary": "https://curl.haxx.se/docs/CVE-2020-8177.html",
"url": "https://curl.haxx.se/docs/CVE-2020-8177.html"
}
],
"release_date": "2020-06-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "The vulnerability is only possible when using the \u0027-J\u0027 and \u0027-i\u0027 switches in conjunction with the curl command. Executing curl without these switches mitigates the flaw.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: Incorrect argument check can allow remote servers to overwrite local files"
},
{
"cve": "CVE-2020-10029",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2020-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1810670"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The glibc version shipped with Red Hat Enterprise Linux 8 is compiled using gcc\u0027s stack-protector option which mitigates the possibility of code execution led by the stack corruption.\n\nThe glibc version shipped with Red Hat Enterprise Linux 7 is more difficult to exploit using this flaw, specifically for remote code execution. Because exploitation of the flaw depends on the usage of pseudo-zero values, an attacker can only overwrite the stack with 0s. Due to this, a valid address value for code execution is difficult to get and is likely to only result in a crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-10029"
},
{
"category": "external",
"summary": "RHBZ#1810670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810670"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10029"
}
],
"release_date": "2020-02-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions"
},
{
"cve": "CVE-2020-12243",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-04-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1833535"
}
],
"notes": [
{
"category": "description",
"text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openldap: denial of service via nested boolean expressions in LDAP search filters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 8 because we don\u0027t ship openldap-servers subpackage with the Red Hat Enterprise Linux 8 (it is only present in the buildroot).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12243"
},
{
"category": "external",
"summary": "RHBZ#1833535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833535"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12243",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12243"
}
],
"release_date": "2020-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openldap: denial of service via nested boolean expressions in LDAP search filters"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Cesar Pereida Garcia and the Network and Information Security Group"
],
"organization": "NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-12400",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-07-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1853983"
}
],
"notes": [
{
"category": "description",
"text": "A side-channel flaw was found in NSS, in the way P-384 and P-521 curves are used in the generation of EDSA signatures, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a side-channel attack that can be used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12400"
},
{
"category": "external",
"summary": "RHBZ#1853983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853983"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12400",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12400"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Cesar Pereida Garcia and the Network and Information Security Group"
],
"organization": "NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-12401",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1851294"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nss. Using the EM side-channel, it is possible to extract the position of zero and non-zero wNAF digits while nss-certutil tool performs scalar multiplication during the ECDSA signature generation, leaking partial information about the ECDSA nonce. Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: ECDSA timing attack mitigation bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a side channel attack which can used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12401"
},
{
"category": "external",
"summary": "RHBZ#1851294",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851294"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12401"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "This is a side channel attack which can used to exact pirate keys when ECDSA signatures are being generated. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: ECDSA timing attack mitigation bypass"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
},
{
"names": [
"Billy Bob Brumley",
"Cesar Pereida",
"Nicola Tuveri",
"Yuval Yarom"
],
"organization": "Network and Information Security Group (NISEC",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-12402",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2020-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1826231"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in NSS, where it is vulnerable to RSA key generation cache timing side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Side channel vulnerabilities during RSA key generation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A timing attack was found in the way NSS generated RSA keys. A man-in-the-middle attacker could use this attack during RSA key generation to recover the private key. This attack is only feasible when the attacker is local to the machine or in certain cross-VM scenarios where the signature is being generated. Attacks over the network or via the internet are not feasible.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12402"
},
{
"category": "external",
"summary": "RHBZ#1826231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826231"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12402"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes"
}
],
"release_date": "2020-06-02T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: Side channel vulnerabilities during RSA key generation"
},
{
"acknowledgments": [
{
"names": [
"the Mozilla Project"
]
}
],
"cve": "CVE-2020-12403",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-08-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1868931"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-12403"
},
{
"category": "external",
"summary": "RHBZ#1868931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12403",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12403"
},
{
"category": "external",
"summary": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes",
"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes"
}
],
"release_date": "2020-07-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read"
},
{
"cve": "CVE-2020-29573",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2020-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1905213"
}
],
"notes": [
{
"category": "description",
"text": "A stack buffer overflow flaw was found in glibc in the way the printf family of functions processed an 80-bit long double with a non-canonical bit pattern. This flaw allows an attacker who can control the arguments of these functions with the non-standard long double pattern to trigger an overflow and cause an application crash. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is essentially a crash which can only be triggered by a non-standard argument passed as a long double input to a member of printf family of functions. The application has to be written in this way to allow this issue to be triggered. The maximum impact is an application crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29573"
},
{
"category": "external",
"summary": "RHBZ#1905213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905213"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29573"
},
{
"category": "external",
"summary": "https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html",
"url": "https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html"
}
],
"release_date": "2020-09-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-03-22T10:10:55+00:00",
"details": "Download and install a new CLI binary by following the instructions linked from the References section.",
"product_ids": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0949"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHODO-1:openshiftdo/odo-init-image-rhel7@sha256:83eea230500106cf84b287fb7249be475171c8ff9ced7025cbf628a213cb9d96_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern"
}
]
}
RHSA-2020:5476
Vulnerability from csaf_redhat - Published: 2020-12-15 17:22 - Updated: 2025-11-21 18:19A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openssl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Reject certificates with explicit EC parameters in strict mode (BZ#1891541)\n\n* Add FIPS selftest for HKDF, SSKDF, SSHKDF, and TLS12PRF; add DH_compute_key KAT to DH selftest (BZ#1891542)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5476",
"url": "https://access.redhat.com/errata/RHSA-2020:5476"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5476.json"
}
],
"title": "Red Hat Security Advisory: openssl security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:19:09+00:00",
"generator": {
"date": "2025-11-21T18:19:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5476",
"initial_release_date": "2020-12-15T17:22:46+00:00",
"revision_history": [
{
"date": "2020-12-15T17:22:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T17:22:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.src",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.src",
"product_id": "openssl-1:1.1.1g-12.el8_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-devel@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-perl@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_id": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1g-12.el8_3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.src",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-devel-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.s390x",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-perl-1:1.1.1g-12.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
},
"product_reference": "openssl-perl-1:1.1.1g-12.el8_3.x86_64",
"relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T17:22:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5476"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.src",
"BaseOS-8.3.0.Z.MAIN:openssl-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-debugsource-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-devel-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.i686",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1g-12.el8_3.x86_64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.aarch64",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.ppc64le",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.s390x",
"BaseOS-8.3.0.Z.MAIN:openssl-perl-1:1.1.1g-12.el8_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0489
Vulnerability from csaf_redhat - Published: 2021-02-11 13:38 - Updated: 2026-03-18 02:06A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 7.\n\nRed Hat Product Security has rated this release as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 11 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0489",
"url": "https://access.redhat.com/errata/RHSA-2021:0489"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "JWS-1938",
"url": "https://issues.redhat.com/browse/JWS-1938"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0489.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 11 security update",
"tracking": {
"current_release_date": "2026-03-18T02:06:29+00:00",
"generator": {
"date": "2026-03-18T02:06:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2021:0489",
"initial_release_date": "2021-02-11T13:38:43+00:00",
"revision_history": [
{
"date": "2021-02-11T13:38:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:38:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:06:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product": {
"name": "Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"product": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"product_id": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-23.redhat_23.ep7.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_id": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native@1.2.23-23.redhat_23.ep7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product": {
"name": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_id": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.23-23.redhat_23.ep7.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src"
},
"product_reference": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7",
"product_id": "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
},
"product_reference": "tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"relates_to_product_reference": "7Server-JWS-3.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:38:43+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0489"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.src",
"7Server-JWS-3.1:tomcat-native-0:1.2.23-23.redhat_23.ep7.el7.x86_64",
"7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.23-23.redhat_23.ep7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
RHSA-2021:0491
Vulnerability from csaf_redhat - Published: 2021-02-11 13:39 - Updated: 2026-03-18 02:06A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat JBoss Web Server 3.1, for RHEL 7 and Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 11 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:0491",
"url": "https://access.redhat.com/errata/RHSA-2021:0491"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0491.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 11 security update",
"tracking": {
"current_release_date": "2026-03-18T02:06:29+00:00",
"generator": {
"date": "2026-03-18T02:06:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2021:0491",
"initial_release_date": "2021-02-11T13:39:36+00:00",
"revision_history": [
{
"date": "2021-02-11T13:39:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T13:39:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:06:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 3.1",
"product": {
"name": "Red Hat JBoss Web Server 3.1",
"product_id": "Red Hat JBoss Web Server 3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"the OpenSSL project"
]
},
{
"names": [
"David Benjamin"
],
"organization": "Google",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2020-1971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903409"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: EDIPARTYNAME NULL pointer de-reference",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a flaw in the GENERAL_NAME_cmp function of openssl which can be triggered when both its arguments are of the same type i.e. EDIPARTYNAME. \n\n1. Red Hat does not ship any applications compiled with openssl, which used the above function in a vulnerable way.\n\n2. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes, when comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate and when verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token). If an attacker can control both items being compared then that attacker could trigger a crash. For example, if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then a crash may be triggered.\n\nThird party applications compiled with openssl using the function GENERAL_NAME_cmp in a vulnerable way are affected by this flaw.\n\nGENERAL_NAME_cmp was added in 0.9.8k, therefore older versions of openssl are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Web Server 3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-1971"
},
{
"category": "external",
"summary": "RHBZ#1903409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20201208.txt",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T13:39:36+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:0491"
},
{
"category": "workaround",
"details": "Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.",
"product_ids": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Web Server 3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "openssl: EDIPARTYNAME NULL pointer de-reference"
}
]
}
CERTFR-2024-AVI-0119
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une élévation de privilèges et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | Simcenter Femap versions antérieures à V2401.0000 | ||
| Siemens | N/A | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | Parasolid V36.0 versions antérieures à V36.0.198 | ||
| Siemens | N/A | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE SC646-2C (6GK5646-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE SC636-2C (6GK5636-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence SUS Small (9DE5110-8CA11-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 versions antérieures à V7.5 SP2 Update 15 | ||
| Siemens | N/A | SINEC NMS versions antérieures à V2.0 SP1 | ||
| Siemens | N/A | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SIMATIC WinCC V8.0 versions antérieures à V8.0 SP4 | ||
| Siemens | N/A | SIDIS Prime versions antérieures à V4.0.400 | ||
| Siemens | N/A | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V2.4 | ||
| Siemens | N/A | Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE SC642-2C (6GK5642-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V2.4 | ||
| Siemens | N/A | Parasolid V35.1 versions antérieures à V35.1.252 | ||
| Siemens | N/A | Tecnomatix Plant Simulation V2201 versions antérieures à V2201.0012 | ||
| Siemens | N/A | RUGGEDCOM APE1808 avec Nozomi Guardian / CMC antérieures à 23.3.0 | ||
| Siemens | N/A | Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE SC632-2C (6GK5632-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | Location Intelligence SUS Large (9DE5110-8CA13-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE SC626-2C (6GK5626-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | Tecnomatix Plant Simulation V2302 versions antérieures à V2302.0006 | ||
| Siemens | N/A | Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE SC622-2C (6GK5622-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | Parasolid V35.0 versions antérieures à V35.0.263 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter Femap versions ant\u00e9rieures \u00e0 V2401.0000",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V36.0 versions ant\u00e9rieures \u00e0 V36.0.198",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Small (9DE5110-8CA11-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC NMS versions ant\u00e9rieures \u00e0 V2.0 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V8.0 versions ant\u00e9rieures \u00e0 V8.0 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIDIS Prime versions ant\u00e9rieures \u00e0 V4.0.400",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V35.1 versions ant\u00e9rieures \u00e0 V35.1.252",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation V2201 versions ant\u00e9rieures \u00e0 V2201.0012",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 avec Nozomi Guardian / CMC ant\u00e9rieures \u00e0 23.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Large (9DE5110-8CA13-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation V2302 versions ant\u00e9rieures \u00e0 V2302.0006",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V35.0 versions ant\u00e9rieures \u00e0 V35.0.263",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
},
{
"name": "CVE-2022-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46393"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2022-41556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41556"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-51440",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51440"
},
{
"name": "CVE-2023-23946",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23946"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30772"
},
{
"name": "CVE-2023-45622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45622"
},
{
"name": "CVE-2023-44321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
},
{
"name": "CVE-2022-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29162"
},
{
"name": "CVE-2023-30585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30585"
},
{
"name": "CVE-2024-23803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23803"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-44317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
},
{
"name": "CVE-2023-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38199"
},
{
"name": "CVE-2022-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2021-45451",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45451"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-30583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30583"
},
{
"name": "CVE-2021-36369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36369"
},
{
"name": "CVE-2023-25727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25727"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2023-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0330"
},
{
"name": "CVE-2023-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
},
{
"name": "CVE-2024-23812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23812"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-45617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45617"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2024-24925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24925"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22042"
},
{
"name": "CVE-2023-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50236"
},
{
"name": "CVE-2022-23521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23521"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-41903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41903"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23816"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2023-1393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1393"
},
{
"name": "CVE-2006-20001",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
},
{
"name": "CVE-2022-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36021"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2024-24922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24922"
},
{
"name": "CVE-2022-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
},
{
"name": "CVE-2024-24923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24923"
},
{
"name": "CVE-2022-39260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39260"
},
{
"name": "CVE-2022-29862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29862"
},
{
"name": "CVE-2024-23800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23800"
},
{
"name": "CVE-2023-39417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2022-3437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3437"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2022-4743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4743"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2023-3247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3247"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0494"
},
{
"name": "CVE-2023-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35828"
},
{
"name": "CVE-2022-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37797"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2024-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24921"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-45625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45625"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-32558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32558"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2022-41861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41861"
},
{
"name": "CVE-2024-23813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23813"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-23802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23802"
},
{
"name": "CVE-2021-43666",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43666"
},
{
"name": "CVE-2023-22490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22490"
},
{
"name": "CVE-2023-0568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0568"
},
{
"name": "CVE-2024-23798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23798"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-32003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32003"
},
{
"name": "CVE-2023-1859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1859"
},
{
"name": "CVE-2023-48363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48363"
},
{
"name": "CVE-2022-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1015"
},
{
"name": "CVE-2023-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32004"
},
{
"name": "CVE-2023-44320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
},
{
"name": "CVE-2022-29187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29187"
},
{
"name": "CVE-2023-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3111"
},
{
"name": "CVE-2023-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28709"
},
{
"name": "CVE-2023-30587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30587"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2022-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46392"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2023-31489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31489"
},
{
"name": "CVE-2023-32005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32005"
},
{
"name": "CVE-2023-45618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45618"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-23810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23810"
},
{
"name": "CVE-2023-30582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30582"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2019-19135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19135"
},
{
"name": "CVE-2022-28737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28737"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2022-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45142"
},
{
"name": "CVE-2023-22742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22742"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2023-27522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2022-48434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48434"
},
{
"name": "CVE-2023-25155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25155"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2023-5253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5253"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2023-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49125"
},
{
"name": "CVE-2021-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3445"
},
{
"name": "CVE-2023-30581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30581"
},
{
"name": "CVE-2023-45627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45627"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-30584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30584"
},
{
"name": "CVE-2024-23801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23801"
},
{
"name": "CVE-2024-24924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24924"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2023-36664",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36664"
},
{
"name": "CVE-2023-21255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21255"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2023-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38559"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45616"
},
{
"name": "CVE-2023-45624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45624"
},
{
"name": "CVE-2023-45614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45614"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2023-46120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46120"
},
{
"name": "CVE-2023-30586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30586"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-44319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-23811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23811"
},
{
"name": "CVE-2023-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35789"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22043"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-4194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4194"
},
{
"name": "CVE-2023-39418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39418"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-2269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2269"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-26081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26081"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-44322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2023-45619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45619"
},
{
"name": "CVE-2023-48364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48364"
},
{
"name": "CVE-2023-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3863"
},
{
"name": "CVE-2022-24834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24834"
},
{
"name": "CVE-2023-30590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30590"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2023-25690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
},
{
"name": "CVE-2022-1348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1348"
},
{
"name": "CVE-2023-2861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2861"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2023-34872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34872"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0567"
},
{
"name": "CVE-2024-23799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23799"
},
{
"name": "CVE-2021-3638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3638"
},
{
"name": "CVE-2023-34256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34256"
},
{
"name": "CVE-2024-23796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23796"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-3301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3301"
},
{
"name": "CVE-2023-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0662"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2022-44370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44370"
},
{
"name": "CVE-2023-45620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45620"
},
{
"name": "CVE-2023-34035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34035"
},
{
"name": "CVE-2022-41860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41860"
},
{
"name": "CVE-2024-23795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23795"
},
{
"name": "CVE-2023-45615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45615"
},
{
"name": "CVE-2022-29536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29536"
},
{
"name": "CVE-2023-49692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49692"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2023-22745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22745"
},
{
"name": "CVE-2022-3294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3294"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-45621",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45621"
},
{
"name": "CVE-2024-23804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23804"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-44373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-45626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45626"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2022-37436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
},
{
"name": "CVE-2024-23797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23797"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1611"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2024-24920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24920"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2023-45623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45623"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2022-4900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4900"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-28450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28450"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0119",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune \u00e9l\u00e9vation de privil\u00e8ges et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-000072 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-000072.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-602936 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-647068 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-647068.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-943925 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-943925.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-753746 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-753746.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-806742 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-806742.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-580228 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-580228.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-716164 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-716164.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-797296 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-797296.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-108696 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-108696.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-871717 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-871717.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-516818 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-516818.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-017796 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-017796.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-543502 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-543502.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-665034 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-665034.html"
}
]
}
CERTFR-2021-AVI-051
Vulnerability from certfr_avis - Published: - Updated:
Cet avis est remplacé par l'avis CERTFR-2021-AVI-065 suite à des modifications et des suppressions dans les bulletins de sécurité de l'éditeur.
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.x antérieures à 3.7.15 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.x à 2.7.7 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.8.x et supérieures antérieures à 3.11.3 | ||
| Stormshield | N/A | Netasq versions 9.0.9 à 9.10.10 | ||
| Stormshield | N/A | SMC versions 2.8 à 3.0 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.x antérieures à 4.1.3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 3.x ant\u00e9rieures \u00e0 3.7.15",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 2.x \u00e0 2.7.7",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.8.x et sup\u00e9rieures ant\u00e9rieures \u00e0 3.11.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.0.9 \u00e0 9.10.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "SMC versions 2.8 \u00e0 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.x ant\u00e9rieures \u00e0 4.1.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7469"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-21T00:00:00.000000"
},
{
"description": "Avis d\u00e9clar\u00e9 obsol\u00e8te",
"revision_date": "2021-01-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "\u003cstrong\u003eCet avis est remplac\u00e9 par l\u0027avis CERTFR-2021-AVI-065 suite \u00e0 des\nmodifications et des suppressions dans les bulletins de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur.\u003c/strong\u003e\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-036 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-036/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-034 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-034/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-035 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-035/"
}
]
}
CERTFR-2021-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données. IBM note que CentOS 6 est en fin de vie. L'éditeur préconise des actions à envisager pour corriger des défauts de sécurité connus. Lien : http://ibm.biz/qradarcentos6
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.0 à 7.4.3 FP 4 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.0 à 7.3.3 FP 10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.4.0 \u00e0 7.4.3 FP 4",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3.0 \u00e0 7.3.3 FP 10",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es. IBM note que CentOS 6 est en\nfin de vie. L\u0027\u00e9diteur pr\u00e9conise des actions \u00e0 envisager pour corriger\ndes d\u00e9fauts de s\u00e9curit\u00e9 connus. Lien : \u003chttp://ibm.biz/qradarcentos6\u003e\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 14 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-374
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 5.13.1",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-374",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-09 du 11 mai 2021",
"url": "https://www.tenable.com/security/tns-2021-09"
}
]
}
CERTFR-2020-AVI-840
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Tenable.sc. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable.sc versions ant\u00e9rieures \u00e0 5.17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-5808",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5808"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-840",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-12-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Tenable.sc.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Tenable.sc",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2020-11 du 22 d\u00e9cembre 2020",
"url": "https://www.tenable.com/security/tns-2020-11"
}
]
}
CERTFR-2021-AVI-051
Vulnerability from certfr_avis - Published: - Updated:
Cet avis est remplacé par l'avis CERTFR-2021-AVI-065 suite à des modifications et des suppressions dans les bulletins de sécurité de l'éditeur.
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.x antérieures à 3.7.15 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.x à 2.7.7 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.8.x et supérieures antérieures à 3.11.3 | ||
| Stormshield | N/A | Netasq versions 9.0.9 à 9.10.10 | ||
| Stormshield | N/A | SMC versions 2.8 à 3.0 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.x antérieures à 4.1.3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 3.x ant\u00e9rieures \u00e0 3.7.15",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 2.x \u00e0 2.7.7",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.8.x et sup\u00e9rieures ant\u00e9rieures \u00e0 3.11.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.0.9 \u00e0 9.10.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "SMC versions 2.8 \u00e0 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.x ant\u00e9rieures \u00e0 4.1.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7469"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-21T00:00:00.000000"
},
{
"description": "Avis d\u00e9clar\u00e9 obsol\u00e8te",
"revision_date": "2021-01-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "\u003cstrong\u003eCet avis est remplac\u00e9 par l\u0027avis CERTFR-2021-AVI-065 suite \u00e0 des\nmodifications et des suppressions dans les bulletins de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur.\u003c/strong\u003e\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-036 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-036/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-034 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-034/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-035 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-035/"
}
]
}
CERTFR-2022-AVI-216
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Mendix Forgot Password Appstore module versions 3.2.x antérieures à 3.2.2
- Mendix Forgot Password Appstore module versions 3.3.x à 3.5.x antérieures à 3.5.1
- Mendix Applications utilisant Mendix versions 7.x antérieures à 7.23.29
- Mendix Applications utilisant Mendix versions 8.x antérieures à 8.18.16
- COMOS versions antérieures à 10.4.1
- Simcenter STAR-CCM+ Viewer versions antérieures à V2022.1
- SIMOTICS CONNECT 400 versions antérieures à 1.0.0.0
- Climatix POL909 (module AWB) versions antérieures à 11.44
- Climatix POL909 (module AWM) versions antérieures à 11.36
- RUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
- SINUMERIK MC versions antérieures à 1.15 SP1
- SINUMERIK ONE versions antérieures à 6.15 SP1
- SINEC INS versions antérieures à 1.0.1.1
- RUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions antérieures à 2.15.0
- Polarion Subversion Webclient versions antérieures à 21 R2 P2
- RUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
L'éditeur ne propose pas de correctif pour :
- Mendix Applications utilisant Mendix versions 9
- SINEC NMS toutes versions
Se référer aux mesures de contournement proposées dans la section Documentation.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.2.x ant\u00e9rieures \u00e0 3.2.2\u003c/li\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.3.x \u00e0 3.5.x ant\u00e9rieures \u00e0 3.5.1\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 7.x ant\u00e9rieures \u00e0 7.23.29\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 8.x ant\u00e9rieures \u00e0 8.18.16\u003c/li\u003e \u003cli\u003eCOMOS versions ant\u00e9rieures \u00e0 10.4.1\u003c/li\u003e \u003cli\u003eSimcenter STAR-CCM+ Viewer versions ant\u00e9rieures \u00e0 V2022.1\u003c/li\u003e \u003cli\u003eSIMOTICS CONNECT 400 versions ant\u00e9rieures \u00e0 1.0.0.0\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWB) versions ant\u00e9rieures \u00e0 11.44\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWM) versions ant\u00e9rieures \u00e0 11.36\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003cli\u003eSINUMERIK MC versions ant\u00e9rieures \u00e0 1.15 SP1\u003c/li\u003e \u003cli\u003eSINUMERIK ONE versions ant\u00e9rieures \u00e0 6.15 SP1\u003c/li\u003e \u003cli\u003eSINEC INS versions ant\u00e9rieures \u00e0 1.0.1.1\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions ant\u00e9rieures \u00e0 2.15.0\u003c/li\u003e \u003cli\u003ePolarion Subversion Webclient versions ant\u00e9rieures \u00e0 21 R2 P2\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur ne propose pas de correctif pour :\u003c/p\u003e \u003cul\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 9\u003c/li\u003e \u003cli\u003eSINEC NMS toutes versions\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux mesures de contournement propos\u00e9es dans la section Documentation.\u003c/p\u003e \u003cp\u003e\u0026nbsp;\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-44478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44478"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2021-42017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42017"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-25174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25174"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2021-32944",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32944"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2021-42020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42020"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2021-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32936"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2020-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
},
{
"name": "CVE-2021-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32946"
},
{
"name": "CVE-2021-41543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41543"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2021-40366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40366"
},
{
"name": "CVE-2021-41542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41542"
},
{
"name": "CVE-2021-41541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41541"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-24309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24309"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2021-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32938"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2022-26317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26317"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2021-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32940"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-37208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37208"
},
{
"name": "CVE-2021-32948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32948"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-26313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26313"
},
{
"name": "CVE-2021-22921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22921"
},
{
"name": "CVE-2021-25216",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25216"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2021-25177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25177"
},
{
"name": "CVE-2021-25175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25175"
},
{
"name": "CVE-2021-22884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22884"
},
{
"name": "CVE-2021-32952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32952"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2018-7160",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7160"
},
{
"name": "CVE-2021-32950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32950"
},
{
"name": "CVE-2021-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3672"
},
{
"name": "CVE-2021-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31346"
},
{
"name": "CVE-2022-26314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26314"
},
{
"name": "CVE-2021-31784",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31784"
},
{
"name": "CVE-2021-22883",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22883"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-31889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31889"
},
{
"name": "CVE-2022-24408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24408"
},
{
"name": "CVE-2021-42016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42016"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-39134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39134"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2020-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8287"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2022-24661",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24661"
},
{
"name": "CVE-2021-22890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-42018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42018"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2021-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39135"
},
{
"name": "CVE-2021-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25176"
},
{
"name": "CVE-2021-31890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31890"
},
{
"name": "CVE-2021-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25178"
},
{
"name": "CVE-2021-22876",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25173"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2021-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31344"
},
{
"name": "CVE-2021-37209",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37209"
},
{
"name": "CVE-2021-42019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42019"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-216",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-166747 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-166747.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-252466 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-252466.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-562051 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-562051.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-223353 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-223353.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-337210 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-337210.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-148641 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-148641.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-389290 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-389290.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-764417 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-764417.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-256353 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-256353.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-703715 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-703715.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-594438 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-594438.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-415938 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-415938.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-134279 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-134279.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-155599 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-155599.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-406691 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-406691.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 8 mars 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
}
]
}
CERTFR-2020-AVI-803
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans OpenSSL. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- OpenSSL 1.1.x versions antérieures à 1.1.1i
- OpenSSL 1.0.2 versions antérieures à 1.0.2x (nécessite un contrat de support spécifique)
Les versions antérieures d'OpenSSL sont potentiellement affectées, l'éditeur n'a pas effectué de vérification sur ces versions.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eOpenSSL 1.1.x versions ant\u00e9rieures \u00e0 1.1.1i\u003c/li\u003e \u003cli\u003eOpenSSL 1.0.2 versions ant\u00e9rieures \u00e0 1.0.2x (n\u00e9cessite un contrat de support sp\u00e9cifique)\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eLes versions ant\u00e9rieures d\u0027OpenSSL sont potentiellement affect\u00e9es, l\u0027\u00e9diteur n\u0027a pas effectu\u00e9 de v\u00e9rification sur ces versions.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenSSL du 08 d\u00e9cembre 2020",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"reference": "CERTFR-2020-AVI-803",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-12-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans OpenSSL. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans OpenSSL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 OpenSSL du 08 d\u00e9cembre 2020",
"url": null
}
]
}
CERTFR-2021-AVI-784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un contournement de la fonctionnalité de sécurité, une atteinte à la confidentialité des données, un déni de service, une élévation de privilèges, une exécution de code à distance et une usurpation d'identité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2013 Cumulative Update 23 | ||
| Microsoft | N/A | System Center 2019 Operations Manager | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.1 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 21 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 11 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 22 | ||
| Microsoft | N/A | Intune management extension | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.0 | ||
| Microsoft | N/A | System Center 2016 Operations Manager | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 10 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | System Center 2012 R2 Operations Manager |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2013 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2019 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 22",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Intune management extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2016 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2012 R2 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-41355",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41355"
},
{
"name": "CVE-2021-40474",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40474"
},
{
"name": "CVE-2021-40479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40479"
},
{
"name": "CVE-2021-41354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41354"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34453"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-40485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40485"
},
{
"name": "CVE-2021-41348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41348"
},
{
"name": "CVE-2021-40472",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40472"
},
{
"name": "CVE-2021-40473",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40473"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-41363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41363"
},
{
"name": "CVE-2021-40481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40481"
},
{
"name": "CVE-2021-41352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41352"
},
{
"name": "CVE-2021-41353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41353"
},
{
"name": "CVE-2021-40480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40480"
},
{
"name": "CVE-2021-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40454"
},
{
"name": "CVE-2021-40457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40457"
},
{
"name": "CVE-2021-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26427"
},
{
"name": "CVE-2021-40471",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40471"
},
{
"name": "CVE-2021-41350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41350"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la fonctionnalit\u00e9 de\ns\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de\nservice, une \u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de code \u00e0 distance\net une usurpation d\u0027identit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 octobre 2021",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2021-AVI-441
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 07 juin 2021",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-1925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1925"
},
{
"name": "CVE-2021-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0607"
},
{
"name": "CVE-2021-0559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0559"
},
{
"name": "CVE-2021-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0554"
},
{
"name": "CVE-2021-0509",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0509"
},
{
"name": "CVE-2021-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0548"
},
{
"name": "CVE-2021-0555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0555"
},
{
"name": "CVE-2020-11176",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11176"
},
{
"name": "CVE-2021-0478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0478"
},
{
"name": "CVE-2021-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0563"
},
{
"name": "CVE-2021-0558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0558"
},
{
"name": "CVE-2021-0538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0538"
},
{
"name": "CVE-2020-11267",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11267"
},
{
"name": "CVE-2021-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1937"
},
{
"name": "CVE-2021-0517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0517"
},
{
"name": "CVE-2021-0527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0527"
},
{
"name": "CVE-2021-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0564"
},
{
"name": "CVE-2021-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0530"
},
{
"name": "CVE-2021-0522",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0522"
},
{
"name": "CVE-2021-0540",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0540"
},
{
"name": "CVE-2021-0534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0534"
},
{
"name": "CVE-2021-0536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0536"
},
{
"name": "CVE-2021-0571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0571"
},
{
"name": "CVE-2021-0532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0532"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-0531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0531"
},
{
"name": "CVE-2021-0505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0505"
},
{
"name": "CVE-2021-0550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0550"
},
{
"name": "CVE-2021-0552",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0552"
},
{
"name": "CVE-2021-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0549"
},
{
"name": "CVE-2021-0521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0521"
},
{
"name": "CVE-2021-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0567"
},
{
"name": "CVE-2021-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0562"
},
{
"name": "CVE-2020-11292",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11292"
},
{
"name": "CVE-2021-0542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0542"
},
{
"name": "CVE-2020-11291",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11291"
},
{
"name": "CVE-2021-0572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0572"
},
{
"name": "CVE-2021-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0565"
},
{
"name": "CVE-2021-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0541"
},
{
"name": "CVE-2021-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0547"
},
{
"name": "CVE-2021-0526",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0526"
},
{
"name": "CVE-2021-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0537"
},
{
"name": "CVE-2021-0507",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0507"
},
{
"name": "CVE-2021-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0520"
},
{
"name": "CVE-2021-0569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0569"
},
{
"name": "CVE-2021-0568",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0568"
},
{
"name": "CVE-2021-0557",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0557"
},
{
"name": "CVE-2021-0506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0506"
},
{
"name": "CVE-2020-11298",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11298"
},
{
"name": "CVE-2021-0545",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0545"
},
{
"name": "CVE-2021-0551",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0551"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0516"
},
{
"name": "CVE-2021-0570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0570"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-0504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0504"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2021-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0553"
},
{
"name": "CVE-2021-0556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0556"
},
{
"name": "CVE-2021-0535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0535"
},
{
"name": "CVE-2020-11304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11304"
},
{
"name": "CVE-2021-0511",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0511"
},
{
"name": "CVE-2021-1900",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1900"
},
{
"name": "CVE-2021-0539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0539"
},
{
"name": "CVE-2021-0546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0546"
},
{
"name": "CVE-2020-11306",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11306"
},
{
"name": "CVE-2021-0566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0566"
},
{
"name": "CVE-2021-0544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0544"
},
{
"name": "CVE-2021-0528",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0528"
},
{
"name": "CVE-2021-0508",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0508"
},
{
"name": "CVE-2021-0606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0606"
},
{
"name": "CVE-2021-0523",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0523"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2021-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0529"
},
{
"name": "CVE-2021-0525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0525"
},
{
"name": "CVE-2021-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
},
{
"name": "CVE-2021-0513",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0513"
},
{
"name": "CVE-2021-0608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0608"
},
{
"name": "CVE-2021-0510",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0510"
},
{
"name": "CVE-2021-0533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0533"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-441",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel 2021-06-01 du 07 juin 2021",
"url": "https://source.android.com/security/bulletin/pixel/2021-06-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android 2021-06-01 du 07 juin 2021",
"url": "https://source.android.com/security/bulletin/2021-06-01"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2021-AVI-065
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance.
Cet avis remplace l'avis CERTFR-2021-AVI-051 suite à la suppression et la modification des bulletins de sécurité de l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.x antérieures à 3.7.15 ou 3.11.3 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.x | ||
| Stormshield | N/A | Netasq versions 9.0.9 à 9.10.10 | ||
| Stormshield | Stormshield Management Center | Stormshield Management Center versions antérieures à 2.8.1 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.x antérieures à 4.1.3 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 3.x ant\u00e9rieures \u00e0 3.7.15 ou 3.11.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 2.x",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.0.9 \u00e0 9.10.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Management Center versions ant\u00e9rieures \u00e0 2.8.1",
"product": {
"name": "Stormshield Management Center",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.x ant\u00e9rieures \u00e0 4.1.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7469"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"name": "CVE-2020-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8277"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-065",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-28T00:00:00.000000"
},
{
"description": "correction \u00e9diteur pour versions SMC affect\u00e9es",
"revision_date": "2021-01-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n\n\u003cstrong\u003eCet avis remplace l\u0027avis CERTFR-2021-AVI-051 suite \u00e0 la suppression et\nla modification des bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur.\u003c/strong\u003e\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-062 du 21 janvier 2021",
"url": "https://advisories.stormshield.eu/2020-062/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-060 du 21 janvier 2021",
"url": "https://advisories.stormshield.eu/2020-060/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-035 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-035/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-034 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-034/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-061 du 21 janvier 2021",
"url": "https://advisories.stormshield.eu/2020-061/"
}
]
}
CERTFR-2021-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données. IBM note que CentOS 6 est en fin de vie. L'éditeur préconise des actions à envisager pour corriger des défauts de sécurité connus. Lien : http://ibm.biz/qradarcentos6
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.0 à 7.4.3 FP 4 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.3.0 à 7.3.3 FP 10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.4.0 \u00e0 7.4.3 FP 4",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.3.0 \u00e0 7.3.3 FP 10",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es. IBM note que CentOS 6 est en\nfin de vie. L\u0027\u00e9diteur pr\u00e9conise des actions \u00e0 envisager pour corriger\ndes d\u00e9fauts de s\u00e9curit\u00e9 connus. Lien : \u003chttp://ibm.biz/qradarcentos6\u003e\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 14 d\u00e9cembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2022-AVI-650
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos Space Security Director Policy Enforcer versions antérieures à 22.1R1 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à 21.4.0 | ||
| Juniper Networks | N/A | Contrôleur Juniper Networks NorthStar versions antérieures à 5.1.0 Service Pack 6 | ||
| Juniper Networks | N/A | Contrôleur Juniper Networks NorthStar versions 6.x antérieures à 6.2.2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.4.x antérieures à 20.4R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.2.x antérieures à 21.2R2-S3, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.2.x antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.1.x antérieures à 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.1.x antérieures à 21.1R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.4.x antérieures à 20.4R3-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.3.x antérieures à 21.3R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.3.x antérieures à 21.3R2-S1, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.4.x antérieures à 20.4R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.2.x antérieures à 19.2R1-S9, 19.2R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.3.x antérieures à 21.3R1-S2, 21.3R2, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.2.x antérieures à 21.2R2-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.4.x antérieures à 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.4.x antérieures à 20.4R2-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.4.x antérieures à 19.4R2-S6, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.4.x antérieures à 18.4R2-S10, 18.4R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions antérieures à 19.1R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.2.x antérieures à 21.2R2-S2, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.4.x antérieures à 21.4R1-S1, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions supérieures à 20.1R1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.4.x antérieures à 20.4R3-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.2.x antérieures à 21.2R2-S1, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.1.x antérieures à 21.1R2-S1, 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.2.x antérieures à 21.2R1-S1, 21.2R2, 21.2R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.3.x antérieures à 19.3R2-S7, 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3.x antérieures à 17.3R3-S12 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.4.x antérieures à 21.4R1-S1, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 19.4.x antérieures à 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.4.x antérieures à 21.4R1-S2, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.1.x antérieures à 19.1R2-S3, 19.1R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49, 15.1X49-D100 et suivantes antérieures à 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.3.x antérieures à 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S21 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.3.x antérieures à 21.3R1-S2, 21.3R2, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.2.x antérieures à 19.2R1-S8, 19.2R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 19.4.x antérieures à 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.1.x antérieures à 21.1R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.4.x antérieures à 20.4R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.4.x antérieures à 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 22.1.x antérieures à 22.1R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.3.x antérieures à 21.3R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX toutes versions antérieures à 19.1R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.4.x antérieures à 19.4R2-S5, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.4.x antérieures à 19.4R2-S6, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.1.x antérieures à 21.1R2, 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.1.x antérieures à 21.1R2-S1, 21.1R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.2.x antérieures à 21.2R2-S2, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.3.x antérieures à 18.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1.x antérieures à 15.1R7-S10 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.3.x antérieures à 21.3R2-S1-EVO, 21.3R3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.2.x antérieures à 21.2R1-S1-EVO, 21.2R3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.4.x antérieures à 21.4R1-S1-EVO, 21.4R2-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.1.x aantérieures à 21.1R3-S1-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.1R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 22.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 21.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contr\u00f4leur Juniper Networks NorthStar versions ant\u00e9rieures \u00e0 5.1.0 Service Pack 6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contr\u00f4leur Juniper Networks NorthStar versions 6.x ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S3, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.3.x ant\u00e9rieures \u00e0 21.3R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.3.x ant\u00e9rieures \u00e0 21.3R2-S1, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.3.x ant\u00e9rieures \u00e0 21.3R1-S2, 21.3R2, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.4.x ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.4.x ant\u00e9rieures \u00e0 20.4R2-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S6, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.4.x ant\u00e9rieures \u00e0 18.4R2-S10, 18.4R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions ant\u00e9rieures \u00e0 19.1R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions sup\u00e9rieures \u00e0 20.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S1, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2-S1, 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.2.x ant\u00e9rieures \u00e0 21.2R1-S1, 21.2R2, 21.2R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.3.x ant\u00e9rieures \u00e0 19.3R2-S7, 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3.x ant\u00e9rieures \u00e0 17.3R3-S12",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 19.4.x ant\u00e9rieures \u00e0 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S2, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.1.x ant\u00e9rieures \u00e0 19.1R2-S3, 19.1R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49, 15.1X49-D100 et suivantes ant\u00e9rieures \u00e0 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.3.x ant\u00e9rieures \u00e0 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S21",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.3.x ant\u00e9rieures \u00e0 21.3R1-S2, 21.3R2, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S8, 19.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 19.4.x ant\u00e9rieures \u00e0 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.4.x ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 22.1.x ant\u00e9rieures \u00e0 22.1R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.3.x ant\u00e9rieures \u00e0 21.3R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX toutes versions ant\u00e9rieures \u00e0 19.1R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S5, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S6, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2, 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2-S1, 21.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.3.x ant\u00e9rieures \u00e0 18.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1.x ant\u00e9rieures \u00e0 15.1R7-S10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.3.x ant\u00e9rieures \u00e0 21.3R2-S1-EVO, 21.3R3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.2.x ant\u00e9rieures \u00e0 21.2R1-S1-EVO, 21.2R3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1-EVO, 21.4R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.1.x aant\u00e9rieures \u00e0 21.1R3-S1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2003-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0001"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2013-7422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7422"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2016-2516",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2516"
},
{
"name": "CVE-2016-4612",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4612"
},
{
"name": "CVE-2016-4610",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4610"
},
{
"name": "CVE-2016-4608",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4608"
},
{
"name": "CVE-2016-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4609"
},
{
"name": "CVE-2016-4607",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4607"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4738"
},
{
"name": "CVE-2016-5300",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5300"
},
{
"name": "CVE-2016-9063",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9063"
},
{
"name": "CVE-2016-8618",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
},
{
"name": "CVE-2016-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
},
{
"name": "CVE-2016-8619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
},
{
"name": "CVE-2016-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5180"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0553"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-1000368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000368"
},
{
"name": "CVE-2017-10989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10989"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-8817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8817"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8380",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8380"
},
{
"name": "CVE-2016-3191",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3191"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2019-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1354"
},
{
"name": "CVE-2019-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1352"
},
{
"name": "CVE-2019-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1387"
},
{
"name": "CVE-2019-1349",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1349"
},
{
"name": "CVE-2019-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1350"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2020-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8616"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2017-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14867"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2020-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1968"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2020-25696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25696"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2020-25717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
},
{
"name": "CVE-2016-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2018-1000654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
},
{
"name": "CVE-2014-9471",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9471"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2017-12562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12562"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2022-22217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22217"
},
{
"name": "CVE-2016-4484",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4484"
},
{
"name": "CVE-2015-4042",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4042"
},
{
"name": "CVE-2016-7943",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7943"
},
{
"name": "CVE-2016-6318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6318"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2016-7942",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7942"
},
{
"name": "CVE-2017-9117",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9117"
},
{
"name": "CVE-2022-22203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22203"
},
{
"name": "CVE-2015-5228",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5228"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2022-22216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22216"
},
{
"name": "CVE-2015-7805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7805"
},
{
"name": "CVE-2017-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8779"
},
{
"name": "CVE-2022-22206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22206"
},
{
"name": "CVE-2016-7947",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7947"
},
{
"name": "CVE-2016-7951",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7951"
},
{
"name": "CVE-2018-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8088"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2014-9488",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9488"
},
{
"name": "CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"name": "CVE-2017-15994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15994"
},
{
"name": "CVE-2022-22209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22209"
},
{
"name": "CVE-2015-8540",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8540"
},
{
"name": "CVE-2016-7950",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7950"
},
{
"name": "CVE-2017-14930",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14930"
},
{
"name": "CVE-2017-8105",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8105"
},
{
"name": "CVE-2016-7949",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7949"
},
{
"name": "CVE-2017-5225",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5225"
},
{
"name": "CVE-2016-1951",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1951"
},
{
"name": "CVE-2017-8871",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8871"
},
{
"name": "CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"name": "CVE-2022-22215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22215"
},
{
"name": "CVE-2015-7036",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7036"
},
{
"name": "CVE-2016-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2779"
},
{
"name": "CVE-2022-22213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22213"
},
{
"name": "CVE-2016-10195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10195"
},
{
"name": "CVE-2014-5044",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5044"
},
{
"name": "CVE-2016-7944",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7944"
},
{
"name": "CVE-2014-9114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9114"
},
{
"name": "CVE-2014-9474",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9474"
},
{
"name": "CVE-2015-2059",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2059"
},
{
"name": "CVE-2022-22207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22207"
},
{
"name": "CVE-2022-22205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22205"
},
{
"name": "CVE-2022-22204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22204"
},
{
"name": "CVE-2017-5929",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
},
{
"name": "CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"name": "CVE-2017-10685",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10685"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2015-8947",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8947"
},
{
"name": "CVE-2019-9893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9893"
},
{
"name": "CVE-2016-1238",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1238"
},
{
"name": "CVE-2016-7948",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7948"
},
{
"name": "CVE-2014-9746",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9746"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2016-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2052"
},
{
"name": "CVE-2021-3487",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3487"
},
{
"name": "CVE-2022-22214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22214"
},
{
"name": "CVE-2014-4043",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4043"
},
{
"name": "CVE-2022-22221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22221"
},
{
"name": "CVE-2022-22212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22212"
},
{
"name": "CVE-2017-16548",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16548"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2014-9939",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9939"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2015-3308",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3308"
},
{
"name": "CVE-2017-7614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7614"
},
{
"name": "CVE-2022-22202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22202"
},
{
"name": "CVE-2017-8421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8421"
},
{
"name": "CVE-2017-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14062"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2022-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
},
{
"name": "CVE-2017-10684",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10684"
},
{
"name": "CVE-2022-22210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22210"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2015-5602",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5602"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"name": "CVE-2017-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17434"
},
{
"name": "CVE-2017-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8287"
},
{
"name": "CVE-2017-8804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8804"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-650",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69723 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-Space-Security-Director-Policy-Enforcer-upgraded-to-CentOS-7-9"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69722 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release-CVE-2022-22218"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69713 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-RIB-and-PFEs-can-get-out-of-sync-due-to-a-memory-leak-caused-by-interface-flaps-or-route-churn-CVE-2022-22209"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69710 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-series-The-PFE-will-crash-when-specific-traffic-is-scanned-by-Enhanced-Web-Filtering-safe-search-CVE-2022-22206"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69717 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69707 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-Receipt-of-specific-traffic-will-lead-to-an-fxpc-process-crash-followed-by-an-FPC-reboot-CVE-2022-22203"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69714 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-MX-Series-An-l2alm-crash-leading-to-an-FPC-crash-can-be-observed-in-VxLAN-scenario-CVE-2022-22210"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69718 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-MPLS-scenario-upon-receipt-of-a-specific-IPv6-packet-an-FPC-will-crash-CVE-2022-22214"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69726 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Contrail-Networking-Multiple-vulnerabilities-resolved-in-Contrail-Networking-21-4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69711 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC11-In-a-GNF-node-slicing-scenario-gathering-AF-interface-statistics-can-lead-to-a-kernel-crash-CVE-2022-22207"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69715 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-OpenSSL-security-fixes"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69708 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-When-receiving-a-specific-SIP-packets-stale-call-table-entries-are-created-which-eventually-leads-to-a-DoS-for-all-SIP-traffic-CVE-2022-22204"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69716 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-hostbound-traffic-will-cause-unexpected-hostbound-traffic-delays-or-drops-CVE-2022-22212"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69719 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-var-run-pid-env-files-are-potentially-not-deleted-during-termination-of-a-gRPC-connection-causing-inode-exhaustion-CVE-2022-22215"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69703 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Northstar-Controller-nginx-component-allows-remote-attacker-to-cause-worker-process-crash-or-potentially-arbitrary-code-execution-CVE-2021-23017-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69721 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX10k-Series-Denial-of-Service-DoS-upon-receipt-of-crafted-MLD-packets-on-multi-homing-ESI-in-VXLAN-CVE-2022-22217"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69720 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Etherleak-memory-disclosure-in-Ethernet-padding-data-CVE-2022-22216"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69725 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-and-EX-Series-Local-privilege-escalation-flaw-in-download-functionality-CVE-2022-22221"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69705 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-in-SQLite-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69709 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-Series-An-FPC-memory-leak-can-occur-in-an-APBR-scenario-CVE-2022-22205"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69706 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-FPCs-may-restart-unexpectedly-upon-receipt-of-specific-MPLS-packets-with-certain-multi-unit-interface-configurations-CVE-2022-22202"
}
]
}
CERTFR-2021-AVI-430
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable LCE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable Log Correlation Engine versions ant\u00e9rieures \u00e0 6.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-430",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable LCE. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable LCE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-10 du 01 juin 2021",
"url": "https://www.tenable.com/security/tns-2021-10"
}
]
}
CERTFR-2021-AVI-621
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Palo Alto Networks | Cortex XSOAR | Cortex XSOAR PowerShell Image versions 7.1.x antérieures à 7.1.3.20270 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.1.x antérieures à 10.1.2 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 9.1.x antérieures à 9.1.11 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.0.x antérieures à 10.0.8 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 8.1.x antérieures à 8.1.19 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 9.0.x antérieures à 9.0.15 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cortex XSOAR PowerShell Image versions 7.1.x ant\u00e9rieures \u00e0 7.1.3.20270",
"product": {
"name": "Cortex XSOAR",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.1.x ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.1.x ant\u00e9rieures \u00e0 9.1.11",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.0.x ant\u00e9rieures \u00e0 10.0.8",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 8.1.x ant\u00e9rieures \u00e0 8.1.19",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.0.x ant\u00e9rieures \u00e0 9.0.15",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3045",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3045"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3050",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3050"
},
{
"name": "CVE-2021-26701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26701"
},
{
"name": "CVE-2021-3048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3048"
},
{
"name": "CVE-2021-3046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3046"
},
{
"name": "CVE-2021-3047",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3047"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-621",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo\nAlto Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3045 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3045"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3048 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3048"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3047 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3047"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2021-0005 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/PAN-SA-2021-0005"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3046 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3046"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-26701 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-26701"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3050 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3050"
}
]
}
CERTFR-2020-AVI-803
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans OpenSSL. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- OpenSSL 1.1.x versions antérieures à 1.1.1i
- OpenSSL 1.0.2 versions antérieures à 1.0.2x (nécessite un contrat de support spécifique)
Les versions antérieures d'OpenSSL sont potentiellement affectées, l'éditeur n'a pas effectué de vérification sur ces versions.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eOpenSSL 1.1.x versions ant\u00e9rieures \u00e0 1.1.1i\u003c/li\u003e \u003cli\u003eOpenSSL 1.0.2 versions ant\u00e9rieures \u00e0 1.0.2x (n\u00e9cessite un contrat de support sp\u00e9cifique)\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eLes versions ant\u00e9rieures d\u0027OpenSSL sont potentiellement affect\u00e9es, l\u0027\u00e9diteur n\u0027a pas effectu\u00e9 de v\u00e9rification sur ces versions.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenSSL du 08 d\u00e9cembre 2020",
"url": "https://www.openssl.org/news/secadv/20201208.txt"
}
],
"reference": "CERTFR-2020-AVI-803",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-12-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans OpenSSL. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans OpenSSL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 OpenSSL du 08 d\u00e9cembre 2020",
"url": null
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-044
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Workbench versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-2070",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2070"
},
{
"name": "CVE-2021-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2056"
},
{
"name": "CVE-2021-2061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2061"
},
{
"name": "CVE-2021-2028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2028"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2021-2046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2046"
},
{
"name": "CVE-2021-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1998"
},
{
"name": "CVE-2021-2072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2072"
},
{
"name": "CVE-2020-5421",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5421"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2019"
},
{
"name": "CVE-2021-2065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2065"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2021",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2021"
},
{
"name": "CVE-2021-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2002"
},
{
"name": "CVE-2021-2076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2076"
},
{
"name": "CVE-2021-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2058"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2122"
},
{
"name": "CVE-2021-2081",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2081"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2030",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2030"
},
{
"name": "CVE-2021-2087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2087"
},
{
"name": "CVE-2021-2088",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2088"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2009",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2009"
},
{
"name": "CVE-2021-2024",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2024"
},
{
"name": "CVE-2020-5408",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5408"
},
{
"name": "CVE-2021-2038",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2038"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2006"
},
{
"name": "CVE-2019-10086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10086"
},
{
"name": "CVE-2021-2012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2012"
},
{
"name": "CVE-2021-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2042"
},
{
"name": "CVE-2021-2016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2016"
},
{
"name": "CVE-2021-2020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2020"
},
{
"name": "CVE-2021-2031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2031"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2055"
},
{
"name": "CVE-2021-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2048"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-044",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2021 du 19 janvier 2021",
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
}
]
}
CERTFR-2021-AVI-638
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Junos Space. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Junos Space versions antérieures à 21.2R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 21.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-16092",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16092"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2020-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15862"
},
{
"name": "CVE-2020-13765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13765"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2020-1472",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1472"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-19532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2020-14318",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14318"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2020-25705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"name": "CVE-2021-26937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26937"
},
{
"name": "CVE-2021-27803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27803"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2021-20277",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20277"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2020-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
},
{
"name": "CVE-2020-14351",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
},
{
"name": "CVE-2020-14323",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14323"
},
{
"name": "CVE-2020-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-638",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Junos\nSpace. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11206 du 17 ao\u00fbt 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11206\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2024-AVI-0119
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une élévation de privilèges et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | Simcenter Femap versions antérieures à V2401.0000 | ||
| Siemens | N/A | SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | Parasolid V36.0 versions antérieures à V36.0.198 | ||
| Siemens | N/A | SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE SC646-2C (6GK5646-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE SC636-2C (6GK5636-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence SUS Small (9DE5110-8CA11-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SIMATIC WinCC V7.5 versions antérieures à V7.5 SP2 Update 15 | ||
| Siemens | N/A | SINEC NMS versions antérieures à V2.0 SP1 | ||
| Siemens | N/A | SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V2.4 | ||
| Siemens | N/A | SIMATIC WinCC V8.0 versions antérieures à V8.0 SP4 | ||
| Siemens | N/A | SIDIS Prime versions antérieures à V4.0.400 | ||
| Siemens | N/A | SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V2.4 | ||
| Siemens | N/A | Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE SC642-2C (6GK5642-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V2.4 | ||
| Siemens | N/A | Parasolid V35.1 versions antérieures à V35.1.252 | ||
| Siemens | N/A | Tecnomatix Plant Simulation V2201 versions antérieures à V2201.0012 | ||
| Siemens | N/A | RUGGEDCOM APE1808 avec Nozomi Guardian / CMC antérieures à 23.3.0 | ||
| Siemens | N/A | Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE SC632-2C (6GK5632-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | Location Intelligence SUS Large (9DE5110-8CA13-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V2.4 | ||
| Siemens | N/A | SCALANCE SC626-2C (6GK5626-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) versions antérieures à V4.3 | ||
| Siemens | N/A | Tecnomatix Plant Simulation V2302 versions antérieures à V2302.0006 | ||
| Siemens | N/A | Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | SCALANCE SC622-2C (6GK5622-2GS00-2AC2) versions antérieures à V3.1 | ||
| Siemens | N/A | Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) versions antérieures à V4.3 | ||
| Siemens | N/A | Parasolid V35.0 versions antérieures à V35.0.263 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter Femap versions ant\u00e9rieures \u00e0 V2401.0000",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V36.0 versions ant\u00e9rieures \u00e0 V36.0.198",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Small (9DE5110-8CA11-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC NMS versions ant\u00e9rieures \u00e0 V2.0 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC V8.0 versions ant\u00e9rieures \u00e0 V8.0 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIDIS Prime versions ant\u00e9rieures \u00e0 V4.0.400",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V35.1 versions ant\u00e9rieures \u00e0 V35.1.252",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation V2201 versions ant\u00e9rieures \u00e0 V2201.0012",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM APE1808 avec Nozomi Guardian / CMC ant\u00e9rieures \u00e0 23.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Large (9DE5110-8CA13-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation V2302 versions ant\u00e9rieures \u00e0 V2302.0006",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V35.0 versions ant\u00e9rieures \u00e0 V35.0.263",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
},
{
"name": "CVE-2022-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46393"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2022-41556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41556"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-51440",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51440"
},
{
"name": "CVE-2023-23946",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23946"
},
{
"name": "CVE-2023-28466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-30772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30772"
},
{
"name": "CVE-2023-45622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45622"
},
{
"name": "CVE-2023-44321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
},
{
"name": "CVE-2022-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29162"
},
{
"name": "CVE-2023-30585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30585"
},
{
"name": "CVE-2024-23803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23803"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-44317",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
},
{
"name": "CVE-2023-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38199"
},
{
"name": "CVE-2022-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2021-45451",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45451"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-30583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30583"
},
{
"name": "CVE-2021-36369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36369"
},
{
"name": "CVE-2023-25727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25727"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2023-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0330"
},
{
"name": "CVE-2023-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
},
{
"name": "CVE-2024-23812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23812"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-45617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45617"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2024-24925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24925"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22042"
},
{
"name": "CVE-2023-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50236"
},
{
"name": "CVE-2022-23521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23521"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-41903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41903"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-35788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-23816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23816"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2023-1393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1393"
},
{
"name": "CVE-2006-20001",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
},
{
"name": "CVE-2022-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36021"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2024-24922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24922"
},
{
"name": "CVE-2022-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
},
{
"name": "CVE-2024-24923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24923"
},
{
"name": "CVE-2022-39260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39260"
},
{
"name": "CVE-2022-29862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29862"
},
{
"name": "CVE-2024-23800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23800"
},
{
"name": "CVE-2023-39417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2022-3437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3437"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2022-4743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4743"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2023-3247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3247"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0494"
},
{
"name": "CVE-2023-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35828"
},
{
"name": "CVE-2022-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37797"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2024-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24921"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-45625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45625"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-32558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32558"
},
{
"name": "CVE-2023-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2022-41861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41861"
},
{
"name": "CVE-2024-23813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23813"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-23802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23802"
},
{
"name": "CVE-2021-43666",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43666"
},
{
"name": "CVE-2023-22490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22490"
},
{
"name": "CVE-2023-0568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0568"
},
{
"name": "CVE-2024-23798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23798"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-32003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32003"
},
{
"name": "CVE-2023-1859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1859"
},
{
"name": "CVE-2023-48363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48363"
},
{
"name": "CVE-2022-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1015"
},
{
"name": "CVE-2023-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32004"
},
{
"name": "CVE-2023-44320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
},
{
"name": "CVE-2022-29187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29187"
},
{
"name": "CVE-2023-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3111"
},
{
"name": "CVE-2023-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28709"
},
{
"name": "CVE-2023-30587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30587"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2022-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46392"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-1670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
},
{
"name": "CVE-2023-31489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31489"
},
{
"name": "CVE-2023-32005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32005"
},
{
"name": "CVE-2023-45618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45618"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2024-23810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23810"
},
{
"name": "CVE-2023-30582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30582"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2019-19135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19135"
},
{
"name": "CVE-2022-28737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28737"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2022-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45142"
},
{
"name": "CVE-2023-22742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22742"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2023-27522",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2022-48434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48434"
},
{
"name": "CVE-2023-25155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25155"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2023-5253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5253"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2023-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49125"
},
{
"name": "CVE-2021-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3445"
},
{
"name": "CVE-2023-30581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30581"
},
{
"name": "CVE-2023-45627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45627"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-30584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30584"
},
{
"name": "CVE-2024-23801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23801"
},
{
"name": "CVE-2024-24924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24924"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2023-36664",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36664"
},
{
"name": "CVE-2023-21255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21255"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2023-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38559"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45616",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45616"
},
{
"name": "CVE-2023-45624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45624"
},
{
"name": "CVE-2023-45614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45614"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2023-46120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46120"
},
{
"name": "CVE-2023-30586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30586"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-44319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-23811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23811"
},
{
"name": "CVE-2023-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35789"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22043"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-4194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4194"
},
{
"name": "CVE-2023-39418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39418"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-2269",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2269"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-26081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26081"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-44322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2023-45619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45619"
},
{
"name": "CVE-2023-48364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48364"
},
{
"name": "CVE-2023-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3863"
},
{
"name": "CVE-2022-24834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24834"
},
{
"name": "CVE-2023-30590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30590"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2023-25690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
},
{
"name": "CVE-2022-1348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1348"
},
{
"name": "CVE-2023-2861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2861"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2023-34872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34872"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0567"
},
{
"name": "CVE-2024-23799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23799"
},
{
"name": "CVE-2021-3638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3638"
},
{
"name": "CVE-2023-34256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34256"
},
{
"name": "CVE-2024-23796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23796"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-3301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3301"
},
{
"name": "CVE-2023-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0662"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2022-44370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44370"
},
{
"name": "CVE-2023-45620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45620"
},
{
"name": "CVE-2023-34035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34035"
},
{
"name": "CVE-2022-41860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41860"
},
{
"name": "CVE-2024-23795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23795"
},
{
"name": "CVE-2023-45615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45615"
},
{
"name": "CVE-2022-29536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29536"
},
{
"name": "CVE-2023-49692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49692"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2023-22745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22745"
},
{
"name": "CVE-2022-3294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3294"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-45621",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45621"
},
{
"name": "CVE-2024-23804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23804"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-11896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-44373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-45626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45626"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2022-37436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
},
{
"name": "CVE-2024-23797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23797"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1611"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2024-24920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24920"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2023-45623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45623"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2022-4900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4900"
},
{
"name": "CVE-2023-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-28450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28450"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0119",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune \u00e9l\u00e9vation de privil\u00e8ges et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-000072 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-000072.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-602936 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-647068 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-647068.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-943925 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-943925.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-753746 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-753746.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-806742 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-806742.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-580228 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-580228.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-716164 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-716164.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-797296 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-797296.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-108696 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-108696.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-871717 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-871717.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-516818 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-516818.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-017796 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-017796.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-543502 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-543502.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-665034 du 13 f\u00e9vrier 2024",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-665034.html"
}
]
}
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
| IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
| IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
| IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Transformer",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38359"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2023-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50324"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-32344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32344"
},
{
"name": "CVE-2023-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43051"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2012-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2018-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-28167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28167"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2010-2084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2084"
},
{
"name": "CVE-2019-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-34357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34357"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2014-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2022-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34165"
},
{
"name": "CVE-2023-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30996"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112541"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7124466"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112504"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7123154"
}
]
}
CERTFR-2021-AVI-638
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Junos Space. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Junos Space versions antérieures à 21.2R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 21.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-16092",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16092"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2020-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15862"
},
{
"name": "CVE-2020-13765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13765"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2020-1472",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1472"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-19532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2020-14318",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14318"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2020-25705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"name": "CVE-2021-26937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26937"
},
{
"name": "CVE-2021-27803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27803"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2021-20277",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20277"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2020-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
},
{
"name": "CVE-2020-14351",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
},
{
"name": "CVE-2020-14323",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14323"
},
{
"name": "CVE-2020-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-638",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Junos\nSpace. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11206 du 17 ao\u00fbt 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11206\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2021-AVI-065
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Elles permettent à un attaquant de provoquer un déni de service à distance.
Cet avis remplace l'avis CERTFR-2021-AVI-051 suite à la suppression et la modification des bulletins de sécurité de l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.x antérieures à 3.7.15 ou 3.11.3 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.x | ||
| Stormshield | N/A | Netasq versions 9.0.9 à 9.10.10 | ||
| Stormshield | Stormshield Management Center | Stormshield Management Center versions antérieures à 2.8.1 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.x antérieures à 4.1.3 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 3.x ant\u00e9rieures \u00e0 3.7.15 ou 3.11.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 2.x",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.0.9 \u00e0 9.10.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Management Center versions ant\u00e9rieures \u00e0 2.8.1",
"product": {
"name": "Stormshield Management Center",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.x ant\u00e9rieures \u00e0 4.1.3",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-7469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7469"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"name": "CVE-2020-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8277"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-065",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-28T00:00:00.000000"
},
{
"description": "correction \u00e9diteur pour versions SMC affect\u00e9es",
"revision_date": "2021-01-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n\n\u003cstrong\u003eCet avis remplace l\u0027avis CERTFR-2021-AVI-051 suite \u00e0 la suppression et\nla modification des bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur.\u003c/strong\u003e\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-062 du 21 janvier 2021",
"url": "https://advisories.stormshield.eu/2020-062/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-060 du 21 janvier 2021",
"url": "https://advisories.stormshield.eu/2020-060/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-035 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-035/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-034 du 18 d\u00e9cembre 2020",
"url": "https://advisories.stormshield.eu/2020-034/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield STORM-2020-061 du 21 janvier 2021",
"url": "https://advisories.stormshield.eu/2020-061/"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2024-AVI-0180
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 Fix Pack 3 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 8 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.2 | ||
| IBM | WebSphere | Websphere Liberty versions antérieures à 23.0.0.12 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le dernier correctif de sécurité OpenSSH | ||
| IBM | Cloud Pak | Cognos Dashboards on Cloud Pak for Data versions antérieures à 4.8.3 | ||
| IBM | N/A | Cognos Command Center versions antérieures à 10.2.5 IF1 | ||
| IBM | Cognos Transformer | Cognos Transformer versions antérieures à 11.1.7 Fix Pack 8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Websphere Liberty versions ant\u00e9rieures \u00e0 23.0.0.12",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le dernier correctif de s\u00e9curit\u00e9 OpenSSH",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 4.8.3",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Command Center versions ant\u00e9rieures \u00e0 10.2.5 IF1",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Transformer versions ant\u00e9rieures \u00e0 11.1.7 Fix Pack 8",
"product": {
"name": "Cognos Transformer",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38359"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2023-50324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50324"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2023-30589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-40609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40609"
},
{
"name": "CVE-2023-32344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32344"
},
{
"name": "CVE-2023-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43051"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2019-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2023-30588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
},
{
"name": "CVE-2012-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5784"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2021-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41035"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2018-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8032"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-28167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28167"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2010-2084",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2084"
},
{
"name": "CVE-2019-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0227"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2022-34357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34357"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2014-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3596"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2022-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34165"
},
{
"name": "CVE-2023-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30996"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112541 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112541"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125640 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7124466 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7124466"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7112504 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7112504"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7125461 du 28 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7125461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7123154 du 23 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7123154"
}
]
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2021-AVI-621
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Palo Alto Networks | Cortex XSOAR | Cortex XSOAR PowerShell Image versions 7.1.x antérieures à 7.1.3.20270 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.1.x antérieures à 10.1.2 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 9.1.x antérieures à 9.1.11 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.0.x antérieures à 10.0.8 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 8.1.x antérieures à 8.1.19 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 9.0.x antérieures à 9.0.15 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cortex XSOAR PowerShell Image versions 7.1.x ant\u00e9rieures \u00e0 7.1.3.20270",
"product": {
"name": "Cortex XSOAR",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.1.x ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.1.x ant\u00e9rieures \u00e0 9.1.11",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.0.x ant\u00e9rieures \u00e0 10.0.8",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 8.1.x ant\u00e9rieures \u00e0 8.1.19",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.0.x ant\u00e9rieures \u00e0 9.0.15",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3045",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3045"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3050",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3050"
},
{
"name": "CVE-2021-26701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26701"
},
{
"name": "CVE-2021-3048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3048"
},
{
"name": "CVE-2021-3046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3046"
},
{
"name": "CVE-2021-3047",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3047"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-621",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo\nAlto Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3045 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3045"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3048 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3048"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3047 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3047"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2021-0005 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/PAN-SA-2021-0005"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3046 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3046"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-26701 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-26701"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3050 du 11 ao\u00fbt 2021",
"url": "https://security.paloaltonetworks.com/CVE-2021-3050"
}
]
}
CERTFR-2021-AVI-784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un contournement de la fonctionnalité de sécurité, une atteinte à la confidentialité des données, un déni de service, une élévation de privilèges, une exécution de code à distance et une usurpation d'identité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2013 Cumulative Update 23 | ||
| Microsoft | N/A | System Center 2019 Operations Manager | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.1 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 21 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 11 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 22 | ||
| Microsoft | N/A | Intune management extension | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Microsoft Dynamics 365 Customer Engagement V9.0 | ||
| Microsoft | N/A | System Center 2016 Operations Manager | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 10 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | System Center 2012 R2 Operations Manager |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2013 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2019 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 22",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Intune management extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Customer Engagement V9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2016 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "System Center 2012 R2 Operations Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-41355",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41355"
},
{
"name": "CVE-2021-40474",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40474"
},
{
"name": "CVE-2021-40479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40479"
},
{
"name": "CVE-2021-41354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41354"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34453"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-40485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40485"
},
{
"name": "CVE-2021-41348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41348"
},
{
"name": "CVE-2021-40472",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40472"
},
{
"name": "CVE-2021-40473",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40473"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-41363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41363"
},
{
"name": "CVE-2021-40481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40481"
},
{
"name": "CVE-2021-41352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41352"
},
{
"name": "CVE-2021-41353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41353"
},
{
"name": "CVE-2021-40480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40480"
},
{
"name": "CVE-2021-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40454"
},
{
"name": "CVE-2021-40457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40457"
},
{
"name": "CVE-2021-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26427"
},
{
"name": "CVE-2021-40471",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40471"
},
{
"name": "CVE-2021-41350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41350"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la fonctionnalit\u00e9 de\ns\u00e9curit\u00e9, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de\nservice, une \u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de code \u00e0 distance\net une usurpation d\u0027identit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 octobre 2021",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2020-AVI-840
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Tenable.sc. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable.sc versions ant\u00e9rieures \u00e0 5.17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-5808",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5808"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-840",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-12-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Tenable.sc.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Tenable.sc",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2020-11 du 22 d\u00e9cembre 2020",
"url": "https://www.tenable.com/security/tns-2020-11"
}
]
}
CERTFR-2022-AVI-650
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos Space Security Director Policy Enforcer versions antérieures à 22.1R1 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à 21.4.0 | ||
| Juniper Networks | N/A | Contrôleur Juniper Networks NorthStar versions antérieures à 5.1.0 Service Pack 6 | ||
| Juniper Networks | N/A | Contrôleur Juniper Networks NorthStar versions 6.x antérieures à 6.2.2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.4.x antérieures à 20.4R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.2.x antérieures à 21.2R2-S3, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.2.x antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.1.x antérieures à 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.1.x antérieures à 21.1R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.4.x antérieures à 20.4R3-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.3.x antérieures à 21.3R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.3.x antérieures à 21.3R2-S1, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.4.x antérieures à 20.4R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.2.x antérieures à 19.2R1-S9, 19.2R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.3.x antérieures à 21.3R1-S2, 21.3R2, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.2.x antérieures à 21.2R2-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.4.x antérieures à 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.4.x antérieures à 20.4R2-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.4.x antérieures à 19.4R2-S6, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.4.x antérieures à 18.4R2-S10, 18.4R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions antérieures à 19.1R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.2.x antérieures à 21.2R2-S2, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.4.x antérieures à 21.4R1-S1, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions antérieures à 19.2R1-S9, 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions supérieures à 20.1R1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.4.x antérieures à 20.4R3-S2, 20.4R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.2.x antérieures à 21.2R2-S1, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.1.x antérieures à 21.1R2-S1, 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.2.x antérieures à 21.2R1-S1, 21.2R2, 21.2R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.3.x antérieures à 19.3R2-S7, 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3.x antérieures à 17.3R3-S12 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.4.x antérieures à 21.4R1-S1, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 19.4.x antérieures à 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.4.x antérieures à 21.4R1-S2, 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 19.1.x antérieures à 19.1R2-S3, 19.1R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49, 15.1X49-D100 et suivantes antérieures à 19.2R3-S5 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.3.x antérieures à 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S21 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 21.3.x antérieures à 21.3R1-S2, 21.3R2, 21.3R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.2.x antérieures à 19.2R1-S8, 19.2R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 19.4.x antérieures à 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes SRX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.3.x antérieures à 20.3R3-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 21.1.x antérieures à 21.1R3-S1 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.4.x antérieures à 20.4R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 21.4.x antérieures à 21.4R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 22.1.x antérieures à 22.1R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.3.x antérieures à 21.3R2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX toutes versions antérieures à 19.1R3-S9 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 19.4.x antérieures à 19.4R2-S5, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.4.x antérieures à 19.4R2-S6, 19.4R3-S8 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 20.2.x antérieures à 20.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 21.1.x antérieures à 21.1R2, 21.1R3-S2 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 21.1.x antérieures à 21.1R2-S1, 21.1R3 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes QFX versions 19.3.x antérieures à 19.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes EX versions 21.2.x antérieures à 21.2R2-S2, 21.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 20.3.x antérieures à 20.3R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.3.x antérieures à 18.3R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes PTX versions 20.1.x antérieures à 20.1R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1.x antérieures à 15.1R7-S10 | ||
| Juniper Networks | Junos OS | Junos OS sur plateformes MX versions 20.2.x antérieures à 20.2R3-S5 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.3.x antérieures à 21.3R2-S1-EVO, 21.3R3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.2.x antérieures à 21.2R1-S1-EVO, 21.2R3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.4.x antérieures à 21.4R1-S1-EVO, 21.4R2-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 21.1.x aantérieures à 21.1R3-S1-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.1R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 22.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 21.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contr\u00f4leur Juniper Networks NorthStar versions ant\u00e9rieures \u00e0 5.1.0 Service Pack 6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contr\u00f4leur Juniper Networks NorthStar versions 6.x ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S3, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.3.x ant\u00e9rieures \u00e0 21.3R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.3.x ant\u00e9rieures \u00e0 21.3R2-S1, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.3.x ant\u00e9rieures \u00e0 21.3R1-S2, 21.3R2, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.4.x ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.4.x ant\u00e9rieures \u00e0 20.4R2-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S6, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.4.x ant\u00e9rieures \u00e0 18.4R2-S10, 18.4R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions ant\u00e9rieures \u00e0 19.1R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions ant\u00e9rieures \u00e0 19.2R1-S9, 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions sup\u00e9rieures \u00e0 20.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2, 20.4R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S1, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2-S1, 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.2.x ant\u00e9rieures \u00e0 21.2R1-S1, 21.2R2, 21.2R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.3.x ant\u00e9rieures \u00e0 19.3R2-S7, 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3.x ant\u00e9rieures \u00e0 17.3R3-S12",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 19.4.x ant\u00e9rieures \u00e0 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S2, 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 19.1.x ant\u00e9rieures \u00e0 19.1R2-S3, 19.1R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49, 15.1X49-D100 et suivantes ant\u00e9rieures \u00e0 19.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.3.x ant\u00e9rieures \u00e0 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S21",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 21.3.x ant\u00e9rieures \u00e0 21.3R1-S2, 21.3R2, 21.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.2.x ant\u00e9rieures \u00e0 19.2R1-S8, 19.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 19.4.x ant\u00e9rieures \u00e0 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes SRX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 21.1.x ant\u00e9rieures \u00e0 21.1R3-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.4.x ant\u00e9rieures \u00e0 20.4R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 21.4.x ant\u00e9rieures \u00e0 21.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 22.1.x ant\u00e9rieures \u00e0 22.1R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.3.x ant\u00e9rieures \u00e0 21.3R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX toutes versions ant\u00e9rieures \u00e0 19.1R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S5, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.4.x ant\u00e9rieures \u00e0 19.4R2-S6, 19.4R3-S8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2, 21.1R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 21.1.x ant\u00e9rieures \u00e0 21.1R2-S1, 21.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes QFX versions 19.3.x ant\u00e9rieures \u00e0 19.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes EX versions 21.2.x ant\u00e9rieures \u00e0 21.2R2-S2, 21.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 20.3.x ant\u00e9rieures \u00e0 20.3R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.3.x ant\u00e9rieures \u00e0 18.3R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes PTX versions 20.1.x ant\u00e9rieures \u00e0 20.1R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1.x ant\u00e9rieures \u00e0 15.1R7-S10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS sur plateformes MX versions 20.2.x ant\u00e9rieures \u00e0 20.2R3-S5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.3.x ant\u00e9rieures \u00e0 21.3R2-S1-EVO, 21.3R3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.2.x ant\u00e9rieures \u00e0 21.2R1-S1-EVO, 21.2R3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.4.x ant\u00e9rieures \u00e0 21.4R1-S1-EVO, 21.4R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 21.1.x aant\u00e9rieures \u00e0 21.1R3-S1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0876",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
},
{
"name": "CVE-2003-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0001"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2013-7422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7422"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2016-2516",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2516"
},
{
"name": "CVE-2016-4612",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4612"
},
{
"name": "CVE-2016-4610",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4610"
},
{
"name": "CVE-2016-4608",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4608"
},
{
"name": "CVE-2016-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4609"
},
{
"name": "CVE-2016-4607",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4607"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4738"
},
{
"name": "CVE-2016-5300",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5300"
},
{
"name": "CVE-2016-9063",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9063"
},
{
"name": "CVE-2016-8618",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
},
{
"name": "CVE-2016-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
},
{
"name": "CVE-2016-8619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
},
{
"name": "CVE-2016-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5180"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0553"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-1000368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000368"
},
{
"name": "CVE-2017-10989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10989"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-8817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8817"
},
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8380",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8380"
},
{
"name": "CVE-2016-3191",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3191"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2019-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1354"
},
{
"name": "CVE-2019-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1352"
},
{
"name": "CVE-2019-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1387"
},
{
"name": "CVE-2019-1349",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1349"
},
{
"name": "CVE-2019-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1350"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2020-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8616"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2017-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14867"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2020-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1968"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2020-25696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25696"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23839"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2020-25717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
},
{
"name": "CVE-2016-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2018-1000654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
},
{
"name": "CVE-2014-9471",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9471"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2017-12562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12562"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2022-22217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22217"
},
{
"name": "CVE-2016-4484",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4484"
},
{
"name": "CVE-2015-4042",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4042"
},
{
"name": "CVE-2016-7943",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7943"
},
{
"name": "CVE-2016-6318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6318"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2016-7942",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7942"
},
{
"name": "CVE-2017-9117",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9117"
},
{
"name": "CVE-2022-22203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22203"
},
{
"name": "CVE-2015-5228",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5228"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2022-22216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22216"
},
{
"name": "CVE-2015-7805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7805"
},
{
"name": "CVE-2017-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8779"
},
{
"name": "CVE-2022-22206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22206"
},
{
"name": "CVE-2016-7947",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7947"
},
{
"name": "CVE-2016-7951",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7951"
},
{
"name": "CVE-2018-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8088"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2014-9488",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9488"
},
{
"name": "CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"name": "CVE-2017-15994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15994"
},
{
"name": "CVE-2022-22209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22209"
},
{
"name": "CVE-2015-8540",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8540"
},
{
"name": "CVE-2016-7950",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7950"
},
{
"name": "CVE-2017-14930",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14930"
},
{
"name": "CVE-2017-8105",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8105"
},
{
"name": "CVE-2016-7949",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7949"
},
{
"name": "CVE-2017-5225",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5225"
},
{
"name": "CVE-2016-1951",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1951"
},
{
"name": "CVE-2017-8871",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8871"
},
{
"name": "CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"name": "CVE-2022-22215",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22215"
},
{
"name": "CVE-2015-7036",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7036"
},
{
"name": "CVE-2016-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2779"
},
{
"name": "CVE-2022-22213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22213"
},
{
"name": "CVE-2016-10195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10195"
},
{
"name": "CVE-2014-5044",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5044"
},
{
"name": "CVE-2016-7944",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7944"
},
{
"name": "CVE-2014-9114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9114"
},
{
"name": "CVE-2014-9474",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9474"
},
{
"name": "CVE-2015-2059",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2059"
},
{
"name": "CVE-2022-22207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22207"
},
{
"name": "CVE-2022-22205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22205"
},
{
"name": "CVE-2022-22204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22204"
},
{
"name": "CVE-2017-5929",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
},
{
"name": "CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"name": "CVE-2017-10685",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10685"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2015-8947",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8947"
},
{
"name": "CVE-2019-9893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9893"
},
{
"name": "CVE-2016-1238",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1238"
},
{
"name": "CVE-2016-7948",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7948"
},
{
"name": "CVE-2014-9746",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9746"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2016-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2052"
},
{
"name": "CVE-2021-3487",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3487"
},
{
"name": "CVE-2022-22214",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22214"
},
{
"name": "CVE-2014-4043",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4043"
},
{
"name": "CVE-2022-22221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22221"
},
{
"name": "CVE-2022-22212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22212"
},
{
"name": "CVE-2017-16548",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16548"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2014-9939",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9939"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2015-3308",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3308"
},
{
"name": "CVE-2017-7614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7614"
},
{
"name": "CVE-2022-22202",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22202"
},
{
"name": "CVE-2017-8421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8421"
},
{
"name": "CVE-2017-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14062"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2022-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
},
{
"name": "CVE-2017-10684",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10684"
},
{
"name": "CVE-2022-22210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22210"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2015-5602",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5602"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"name": "CVE-2017-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17434"
},
{
"name": "CVE-2017-8287",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8287"
},
{
"name": "CVE-2017-8804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8804"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-650",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69723 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-Space-Security-Director-Policy-Enforcer-upgraded-to-CentOS-7-9"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69722 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release-CVE-2022-22218"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69713 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-RIB-and-PFEs-can-get-out-of-sync-due-to-a-memory-leak-caused-by-interface-flaps-or-route-churn-CVE-2022-22209"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69710 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-series-The-PFE-will-crash-when-specific-traffic-is-scanned-by-Enhanced-Web-Filtering-safe-search-CVE-2022-22206"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69717 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69707 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-Receipt-of-specific-traffic-will-lead-to-an-fxpc-process-crash-followed-by-an-FPC-reboot-CVE-2022-22203"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69714 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-MX-Series-An-l2alm-crash-leading-to-an-FPC-crash-can-be-observed-in-VxLAN-scenario-CVE-2022-22210"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69718 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-MPLS-scenario-upon-receipt-of-a-specific-IPv6-packet-an-FPC-will-crash-CVE-2022-22214"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69726 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Contrail-Networking-Multiple-vulnerabilities-resolved-in-Contrail-Networking-21-4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69711 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC11-In-a-GNF-node-slicing-scenario-gathering-AF-interface-statistics-can-lead-to-a-kernel-crash-CVE-2022-22207"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69715 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-OpenSSL-security-fixes"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69708 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-When-receiving-a-specific-SIP-packets-stale-call-table-entries-are-created-which-eventually-leads-to-a-DoS-for-all-SIP-traffic-CVE-2022-22204"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69716 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-hostbound-traffic-will-cause-unexpected-hostbound-traffic-delays-or-drops-CVE-2022-22212"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69719 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-var-run-pid-env-files-are-potentially-not-deleted-during-termination-of-a-gRPC-connection-causing-inode-exhaustion-CVE-2022-22215"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69703 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Northstar-Controller-nginx-component-allows-remote-attacker-to-cause-worker-process-crash-or-potentially-arbitrary-code-execution-CVE-2021-23017-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69721 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-QFX10k-Series-Denial-of-Service-DoS-upon-receipt-of-crafted-MLD-packets-on-multi-homing-ESI-in-VXLAN-CVE-2022-22217"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69720 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Etherleak-memory-disclosure-in-Ethernet-padding-data-CVE-2022-22216"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69725 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-and-EX-Series-Local-privilege-escalation-flaw-in-download-functionality-CVE-2022-22221"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69705 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-in-SQLite-resolved"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69709 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-SRX-Series-An-FPC-memory-leak-can-occur-in-an-APBR-scenario-CVE-2022-22205"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69706 du 13 juillet 2022",
"url": "https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-PTX-Series-FPCs-may-restart-unexpectedly-upon-receipt-of-specific-MPLS-packets-with-certain-multi-unit-interface-configurations-CVE-2022-22202"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2021-AVI-374
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 5.13.1",
"product": {
"name": "Nessus",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-374",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-09 du 11 mai 2021",
"url": "https://www.tenable.com/security/tns-2021-09"
}
]
}
CERTFR-2021-AVI-430
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable LCE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tenable Log Correlation Engine versions ant\u00e9rieures \u00e0 6.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-430",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable LCE. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable LCE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2021-10 du 01 juin 2021",
"url": "https://www.tenable.com/security/tns-2021-10"
}
]
}
CERTFR-2021-AVI-044
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Workbench versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-2070",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2070"
},
{
"name": "CVE-2021-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2056"
},
{
"name": "CVE-2021-2061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2061"
},
{
"name": "CVE-2021-2028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2028"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2021-2046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2046"
},
{
"name": "CVE-2021-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1998"
},
{
"name": "CVE-2021-2072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2072"
},
{
"name": "CVE-2020-5421",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5421"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2019"
},
{
"name": "CVE-2021-2065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2065"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2021",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2021"
},
{
"name": "CVE-2021-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2002"
},
{
"name": "CVE-2021-2076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2076"
},
{
"name": "CVE-2021-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2058"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2122"
},
{
"name": "CVE-2021-2081",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2081"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2030",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2030"
},
{
"name": "CVE-2021-2087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2087"
},
{
"name": "CVE-2021-2088",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2088"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2009",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2009"
},
{
"name": "CVE-2021-2024",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2024"
},
{
"name": "CVE-2020-5408",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5408"
},
{
"name": "CVE-2021-2038",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2038"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2006"
},
{
"name": "CVE-2019-10086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10086"
},
{
"name": "CVE-2021-2012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2012"
},
{
"name": "CVE-2021-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2042"
},
{
"name": "CVE-2021-2016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2016"
},
{
"name": "CVE-2021-2020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2020"
},
{
"name": "CVE-2021-2031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2031"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2055"
},
{
"name": "CVE-2021-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2048"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-044",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2021 du 19 janvier 2021",
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2021-AVI-187
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Symantec. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Symantec | N/A | Symantec Messaging Gateway (SMG) version 10.7 | ||
| Symantec | N/A | ProxySG versions 6.7.x | ||
| Symantec | N/A | ProxySG versions 7.2.x | ||
| Symantec | N/A | Unified Agent version 4.10 | ||
| Symantec | N/A | SSL Visibility (SSLV) version 4.5 | ||
| Symantec | N/A | ProxySG versions 7.3.x | ||
| Symantec | N/A | Security Analytics (SA) versions 7.2, 8.1 et 8.2 | ||
| Symantec | N/A | Reporter versions 10.5 et 10.6 | ||
| Symantec | N/A | Management Center (MC) versions 3.0 et 3.1 | ||
| Symantec | N/A | Advanced Secure Gateway (ASG) versions 6.7.x | ||
| Symantec | N/A | WSS Mobile Agent version 2.0 | ||
| Symantec | N/A | WSS Agent version 7.2 | ||
| Symantec | N/A | Content Analysis (CA) versions 2.4, 3.0 et 3.1 | ||
| Symantec | N/A | Advanced Secure Gateway (ASG) versions 7.3.x | ||
| Symantec | N/A | Advanced Secure Gateway (ASG) versions 7.2.x |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Symantec Messaging Gateway (SMG) version 10.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "ProxySG versions 6.7.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "ProxySG versions 7.2.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Unified Agent version 4.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "SSL Visibility (SSLV) version 4.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "ProxySG versions 7.3.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Security Analytics (SA) versions 7.2, 8.1 et 8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Reporter versions 10.5 et 10.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Management Center (MC) versions 3.0 et 3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Advanced Secure Gateway (ASG) versions 6.7.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "WSS Mobile Agent version 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "WSS Agent version 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Content Analysis (CA) versions 2.4, 3.0 et 3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Advanced Secure Gateway (ASG) versions 7.3.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
},
{
"description": "Advanced Secure Gateway (ASG) versions 7.2.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Symantec",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-23839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23839"
},
{
"name": "CVE-2020-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1968"
},
{
"name": "CVE-2020-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23840"
},
{
"name": "CVE-2020-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23841"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-187",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-03-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSymantec. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Symantec",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Symantec SYMSA17570 du 09 mars 2021",
"url": "https://support.broadcom.com/security-advisory/content/0/0/SYMSA17570"
}
]
}
CERTFR-2021-AVI-296
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL versions ant\u00e9rieures \u00e0 5.7.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL versions ant\u00e9rieures \u00e0 8.0.24",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2020-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8277"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2020-17527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17527"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2020-17530",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17530"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-296",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-04-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2021 du 20 avril 2021",
"url": "https://www.oracle.com/security-alerts/cpuapr2021.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuapr2021 du 20 avril 2021",
"url": "https://www.oracle.com/security-alerts/cpuapr2021verbose.html#MSQL"
}
]
}
CERTFR-2022-AVI-216
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Mendix Forgot Password Appstore module versions 3.2.x antérieures à 3.2.2
- Mendix Forgot Password Appstore module versions 3.3.x à 3.5.x antérieures à 3.5.1
- Mendix Applications utilisant Mendix versions 7.x antérieures à 7.23.29
- Mendix Applications utilisant Mendix versions 8.x antérieures à 8.18.16
- COMOS versions antérieures à 10.4.1
- Simcenter STAR-CCM+ Viewer versions antérieures à V2022.1
- SIMOTICS CONNECT 400 versions antérieures à 1.0.0.0
- Climatix POL909 (module AWB) versions antérieures à 11.44
- Climatix POL909 (module AWM) versions antérieures à 11.36
- RUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
- SINUMERIK MC versions antérieures à 1.15 SP1
- SINUMERIK ONE versions antérieures à 6.15 SP1
- SINEC INS versions antérieures à 1.0.1.1
- RUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions antérieures à 2.15.0
- Polarion Subversion Webclient versions antérieures à 21 R2 P2
- RUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions antérieures à 5.6.0
L'éditeur ne propose pas de correctif pour :
- Mendix Applications utilisant Mendix versions 9
- SINEC NMS toutes versions
Se référer aux mesures de contournement proposées dans la section Documentation.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.2.x ant\u00e9rieures \u00e0 3.2.2\u003c/li\u003e \u003cli\u003eMendix Forgot Password Appstore module versions 3.3.x \u00e0 3.5.x ant\u00e9rieures \u00e0 3.5.1\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 7.x ant\u00e9rieures \u00e0 7.23.29\u003c/li\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 8.x ant\u00e9rieures \u00e0 8.18.16\u003c/li\u003e \u003cli\u003eCOMOS versions ant\u00e9rieures \u00e0 10.4.1\u003c/li\u003e \u003cli\u003eSimcenter STAR-CCM+ Viewer versions ant\u00e9rieures \u00e0 V2022.1\u003c/li\u003e \u003cli\u003eSIMOTICS CONNECT 400 versions ant\u00e9rieures \u00e0 1.0.0.0\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWB) versions ant\u00e9rieures \u00e0 11.44\u003c/li\u003e \u003cli\u003eClimatix POL909 (module AWM) versions ant\u00e9rieures \u00e0 11.36\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS M2100, RMC8388, RS416v2, RS900G, RS900G (32M), RSG900, RSG920P, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003cli\u003eSINUMERIK MC versions ant\u00e9rieures \u00e0 1.15 SP1\u003c/li\u003e \u003cli\u003eSINUMERIK ONE versions ant\u00e9rieures \u00e0 6.15 SP1\u003c/li\u003e \u003cli\u003eSINEC INS versions ant\u00e9rieures \u00e0 1.0.1.1\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536 et RX5000 versions ant\u00e9rieures \u00e0 2.15.0\u003c/li\u003e \u003cli\u003ePolarion Subversion Webclient versions ant\u00e9rieures \u00e0 21 R2 P2\u003c/li\u003e \u003cli\u003eRUGGEDCOM ROS i800, i801, i802, i803, M969, M2100, M2200, RMC, RMC20, RMC30, RMC40, RMC41, RMC8388, RP110, RS400, RS401, RS416, RS416v2, RS900 (32M), RS900G, RS900G (32M), RS900GP, RS900L, RS900L, RS900W, RS910, RS910L, RS910W, RS920L, RS920W, RS930L, RS930W, RS940G, RS969, RS8000, RS8000A, RS8000H, RS8000T, RSG900, RSG900C, RSG900G, RSG900R, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSG2100, RSG2100 (32M), RSG2100P, RSG2100P (32M), RSG2200, RSG2288, RSG2300, RSG2300P, RSG2488, RSL910, RST916C, RST916P et RST2228 versions ant\u00e9rieures \u00e0 5.6.0\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eL\u0027\u00e9diteur ne propose pas de correctif pour :\u003c/p\u003e \u003cul\u003e \u003cli\u003eMendix Applications utilisant Mendix versions 9\u003c/li\u003e \u003cli\u003eSINEC NMS toutes versions\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux mesures de contournement propos\u00e9es dans la section Documentation.\u003c/p\u003e \u003cp\u003e\u0026nbsp;\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-44478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44478"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2021-42017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42017"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-25174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25174"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-37701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
},
{
"name": "CVE-2021-32944",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32944"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2021-42020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42020"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2021-22940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22940"
},
{
"name": "CVE-2021-32804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2021-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32936"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2020-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27304"
},
{
"name": "CVE-2021-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32946"
},
{
"name": "CVE-2021-41543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41543"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22939"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2021-40366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40366"
},
{
"name": "CVE-2021-41542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41542"
},
{
"name": "CVE-2021-41541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41541"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2022-24309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24309"
},
{
"name": "CVE-2020-8265",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8265"
},
{
"name": "CVE-2021-37713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2021-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32938"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2022-26317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26317"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-37712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2021-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32940"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-37208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37208"
},
{
"name": "CVE-2021-32948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32948"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-26313",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26313"
},
{
"name": "CVE-2021-22921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22921"
},
{
"name": "CVE-2021-25216",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25216"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2021-32803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
},
{
"name": "CVE-2021-25177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25177"
},
{
"name": "CVE-2021-25175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25175"
},
{
"name": "CVE-2021-22884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22884"
},
{
"name": "CVE-2021-32952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32952"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2018-7160",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7160"
},
{
"name": "CVE-2021-32950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32950"
},
{
"name": "CVE-2021-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3672"
},
{
"name": "CVE-2021-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31346"
},
{
"name": "CVE-2022-26314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26314"
},
{
"name": "CVE-2021-31784",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31784"
},
{
"name": "CVE-2021-22883",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22883"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-22931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22931"
},
{
"name": "CVE-2021-31889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31889"
},
{
"name": "CVE-2022-24408",